{"id":21662,"date":"2021-10-07T00:44:48","date_gmt":"2021-10-06T22:44:48","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=21662"},"modified":"2021-10-08T21:28:03","modified_gmt":"2021-10-08T19:28:03","slug":"0-day-schwachstelle-cve-2021-41773-in-apache","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/10\/07\/0-day-schwachstelle-cve-2021-41773-in-apache\/","title":{"rendered":"0-day vulnerability (CVE-2021-41773) in Apache"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/10\/07\/0-day-schwachstelle-cve-2021-41773-in-apache\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]A 0-day vulnerability (CVE-2021-41773) and another vulnerability that is already being actively exploited in the wild have been made public in Apache web servers. The Apache Software Foundation (ASF) has released security updates to close the new vulnerabilities. Updating Apache installations with the affected patches is urgent.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg08.met.vgwort.de\/na\/88eb6742ac76488c9ac281f87b846156\" alt=\"\" width=\"1\" height=\"1\" \/>Security researcher Kevin Beaumont points out in the following <a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1445405621571014671\" target=\"_blank\" rel=\"noopener\">tweet<\/a> that the newly disclosed Path Traversal vulnerability (CVE-2021-41773) in Apache 2.4.49 appeared as a Unicode vulnerability back in 2000.<\/p>\n<p><a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1445405621571014671\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.\" src=\"https:\/\/i.imgur.com\/jVk06zQ.png\" alt=\"CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.\" \/><\/a><\/p>\n<p>Attacks exploiting this flaw have already been discovered by Ash Daulton and the cPanel security team. They then reported the problem to the Apache team.<\/p>\n<p>The Apache Software Foundation has published <a href=\"https:\/\/httpd.apache.org\/security\/vulnerabilities_24.html\" target=\"_blank\" rel=\"noopener\">this security advisory<\/a> on Apache 2.4 vulnerabilities. The Path Traversal vulnerability (CVE-2021-41773) is only present in Apache 2.4.49 and has been fixed in version 2.4.50. \"An attacker could use a path traversal attack to point URLs to files outside the expected document root,\" the Apache Software Foundation wrote in the Apache HTTP Server 2.4.50 changelog. \"If files outside the document root are not protected by 'require all denied,' these requests could succeed. Also, this bug could expose the source code of interpreted files such as CGI scripts,\" it continues.<\/p>\n<p><a href=\"https:\/\/twitter.com\/TheHackersNews\/status\/1445405839041437699\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.\" src=\"https:\/\/i.imgur.com\/pkYmJOm.png\" alt=\"CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.\" \/><\/a><\/p>\n<p>The Hacker News points out the vulnerabilities in the above <a href=\"https:\/\/twitter.com\/TheHackersNews\/status\/1445405839041437699\" target=\"_blank\" rel=\"noopener\">tweet<\/a> and in <a href=\"https:\/\/thehackernews.com\/2021\/10\/apache-warns-of-zero-day-exploit-in.html\" target=\"_blank\" rel=\"noopener\">this post<\/a>. Another post with some information can be found at <a href=\"https:\/\/therecord.media\/apache-fixes-actively-exploited-web-server-zero-day\/\" target=\"_blank\" rel=\"noopener\">The Record Media<\/a>. Meanwhile, security researchers have posted several proof-of-concept exploits on Twitter, which are linked in the article in question.<\/p>\n<p><strong>Addendum:<\/strong> Since the first patch was incomplete, the Apache Foundation has followed up with an update. Bleeping Computer has published an article about it <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/apache-emergency-update-fixes-incomplete-patch-for-exploited-bug\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]A 0-day vulnerability (CVE-2021-41773) and another vulnerability that is already being actively exploited in the wild have been made public in Apache web servers. The Apache Software Foundation (ASF) has released security updates to close the new vulnerabilities. Updating Apache &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/10\/07\/0-day-schwachstelle-cve-2021-41773-in-apache\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[69],"class_list":["post-21662","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/21662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=21662"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/21662\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=21662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=21662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=21662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}