CVE STALKER

CVE-2021-42013

CVSS
DESCRIPTIONIt was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.
HEAT SCORE2187

WORDS

TWEETS

DATE TWEETS USER
2021-12-05 21:20:18Path Traversal and Remote Code Execution in Apache HTTP Server (incomplete fix of CVE-2021-41773) (CVE-2021-42013) https://t.co/TZ5x21MNI0 https://www.systemtek.co.uk/2021/12/path-traversal-and-remote-code-execution-in-apache-http-server-incomplete-fix-of-cve-2021-41773-cve-2021-42013/SystemTek_UK
2021-12-05 21:20:16Path Traversal and Remote Code Execution in Apache HTTP Server (incomplete fix of CVE-2021-41773) (CVE-2021-42013) https://t.co/l4omtvXX8N https://www.systemtek.co.uk/2021/12/path-traversal-and-remote-code-execution-in-apache-http-server-incomplete-fix-of-cve-2021-41773-cve-2021-42013/6townstechteam
2021-12-03 15:00:10CVE-2021-42013 attempt from /144.126.143.214 (@ContaboCom , 🇺🇸) IP: /144.126.143.214 Method: GET Path: /cgi-bin/.%… https://t.co/GQBOxmSg5Y https://twitter.com/i/web/status/1466782487762423816fish_illuminati
2021-12-02 19:11:28PDF | Explotación del servidor HTTP #Apache 2.4.50 CVE-2021-42013 Este documento tiene como objetivo explicar algun… https://t.co/VJNas3Bc6L https://twitter.com/i/web/status/1466482844323221510drok3r
2021-12-02 14:30:09Apache HTTP Server 2.4.50 CVE-2021-42013 Exploitation https://t.co/3eZcdFWwV2 http://dlvr.it/SDcb6NExploit_This
2021-12-02 00:20:13#Apache HTTP Server 2.4.50 CVE-2021-42013 Exploitation https://t.co/XDFVWKXFs9 #PacketStorm https://packetstormsecurity.com/files/165089/CVE-2021-42013.pdfSecurityNewsbot
2021-12-01 03:50:32Whitepaper "Apache HTTP Server 2.4.50 CVE-2021-42013 Exploitation". // This document aims at explaining some recen… https://t.co/ij0ZrMmxJ1 https://twitter.com/i/web/status/1465890586003746822AlirezaGhahrood
2021-11-30 20:22:04🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/jxp81BQ6ED https://twitter.com/i/web/status/1465777540056993798threatintelctr
2021-11-30 08:44:53Apache HTTP Server 2.4.50 CVE-2021-42013 Exploitation https://t.co/7uZkeHOqhF https://ift.tt/3FXh8yHcyberbuzznews
2021-11-29 20:20:46Apache HTTP Server 2.4.50 CVE-2021-42013 Exploitation https://t.co/pEV9xKQwBy https://packetstormsecurity.com/files/165089/CVE-2021-42013.pdf?utm_source=dlvr.it&utm_medium=twitterHackerSpyNet1
2021-11-29 20:20:08🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/C7UzF3OHSO https://twitter.com/i/web/status/1465415151633543169threatintelctr
2021-11-29 19:40:57Update: Apache HTTP Server 2.4.50 CVE-2021-42013 Exploitation https://t.co/rB2f1JqyyR https://deepquest.code511.com/blog/2021/11/apache-http-server-2-4-50-cve-2021-42013-exploitation/?utm_campaign=twitter&utm_medium=twitter&utm_source=twitterdeepquest
2021-11-29 19:25:01Apache HTTP Server 2.4.50 CVE-2021-42013 Exploitation https://t.co/vUG6q1Pf7n #exploit https://packetstormsecurity.com/files/165089cyberintel
2021-11-29 18:31:24New post from https://t.co/9KYxtdZjkl (Apache HTTP Server 2.4.50 CVE-2021-42013 Exploitation) has been published on https://t.co/0rGthHsATu http://www.sesin.at https://www.sesin.at/2021/11/29/apache-http-server-2-4-50-cve-2021-42013-exploitation/www_sesin_at
2021-11-29 18:31:15New post from https://t.co/uXvPWJy6tj (Apache HTTP Server 2.4.50 CVE-2021-42013 Exploitation) has been published on https://t.co/fGAoVLacOX http://www.sesin.at https://www.sesin.at/2021/11/29/apache-http-server-2-4-50-cve-2021-42013-exploitation/WolfgangSesin
2021-11-29 18:31:08Apache HTTP Server 2.4.50 CVE-2021-42013 Exploitation: This document aims at explaining some recent vulnerabilities… https://t.co/PgmoqHcybG https://twitter.com/i/web/status/1465385461120073731shah_sheikh
2021-11-29 18:31:00Apache HTTP Server 2.4.50 CVE-2021-42013 Exploitation: This document aims at explaining some recent vulnerabilities… https://t.co/PT00pq3K5F https://twitter.com/i/web/status/1465385461862440968cipherstorm
2021-11-29 18:30:17Apache HTTP Server 2.4.50 CVE-2021-42013 Exploitation https://t.co/0Dc77shppY #exploit https://packetstormsecurity.com/files/165089packet_storm
2021-11-29 18:21:46Apache HTTP Server 2.4.50 CVE-2021-42013 Exploitation https://t.co/UGL3wQ0KeN https://t.co/Tj4VjgFH1Y http://dlvr.it/SDQHY7AcooEdi
2021-11-20 08:20:07Apache HTTP Server 2.4.49 & 2.4.50 Path Traversal (CVE-2021-42013) https://t.co/f30ZNkpLs2 https://ift.tt/3DwP5Frcc_cyberdefence
2021-11-19 06:10:14#Apache HTTP Server 2.4.49 & 2.4.50 Path Traversal (CVE-2021-42013) https://t.co/r1Ll0BTafx #Nessus https://www.tenable.com/plugins/nessus/155600SecurityNewsbot
2021-11-13 12:40:18ExCraft SCADA std 1.90 : - Apache 2.4.49-50 for Windows. RCE CVE-2021-41773 combined with CVE-2021-42013 - ECOA… https://t.co/HjDve8woTb https://twitter.com/i/web/status/1459496874830974976ExCraft_labs
2021-11-13 12:40:05Agora 3.18: - CVE-2021-41773, CVE-2021-42013 Apache HTTP Server 2.4.49, 2.4.50 RCE - GitLab 12.9.0 DirTrav CVE-2… https://t.co/tV6kJBm9RF https://twitter.com/i/web/status/1459500428698210312GlegExploitPack
2021-11-12 09:00:12🔴APACHE🔴 Múltiples vulnerabilidades de severidad alta en productos APACHE: CVE-2021-42013,CVE-2021-41773 Más inf… https://t.co/wvGulcJJDb https://twitter.com/i/web/status/1459082312382132224GrupoICA_Ciber
2021-11-11 18:20:03🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/Ly3rYtr2EW https://twitter.com/i/web/status/1458861970153631745threatintelctr
2021-11-11 17:20:12🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/hgExtGMIiT https://twitter.com/i/web/status/1458846875235278855threatintelctr
2021-11-11 16:40:10نسخه های اخیر Apache هر چی بیرون اومده فیکس های امنیتی بوده! نسخه 2.4.51، برای رفع CVE-2021-42013و CVE-2021-41773 ه… https://t.co/XQJb27uAtd https://twitter.com/i/web/status/1458835861693517830vahidnameni
2021-11-10 17:30:10And the winner is... CVE-2021-42013! Our November vuln of the month comes to us affecting organizations running Ap… https://t.co/VMWUoVV5U4 https://twitter.com/i/web/status/1458486696811503619KennaSecurity
2021-11-07 21:10:13🚨 ATTN! 🚨 New research from Juniper Threat Labs has made discovery: Apache HTTP Server CVE-2021-42013 and CVE-202… https://t.co/BkaaHjOTGS https://twitter.com/i/web/status/1457452826611888128EvanKirstel
2021-11-07 08:20:05my analysis for Apache CVE-2021-41773 and CVE-2021-42013: https://t.co/oH1fMazWxT https://0xbigshaq.github.io/2021/10/31/hacking-apache-like-its-20040x_shaq
2021-11-06 20:00:09🚨 ATTN! 🚨 New research from Juniper Threat Labs has made discovery: Apache HTTP Server CVE-2021-42013 and CVE-202… https://t.co/9jEuZ4kU3v https://twitter.com/i/web/status/1457072808580767747BCstrat
2021-11-06 16:40:04🚨 ATTN! 🚨 New research from Juniper Threat Labs has made discovery: Apache HTTP Server CVE-2021-42013 and CVE-202… https://t.co/GJnHTCoAMH https://twitter.com/i/web/status/1457023235736981504JuniperNetworks
2021-11-04 12:50:11🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/wIToQMkX9F https://twitter.com/i/web/status/1456242208517070858threatintelctr
2021-11-03 13:50:49Brute force nginx reverse proxy list; chain CVE-2021-40438; CVE-2021-42013; pipe oob reverse shell; == killer -- https://t.co/3kNd73d4iHdualfade
2021-11-03 11:50:20CVE-2021-42013 It was found that the fix for #CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An atta… https://t.co/UuyWy8Pas2 https://twitter.com/i/web/status/1455862844084441092cryeye_project
2021-11-03 08:50:06Apache HTTP Server Path Traversal & Remote Code Execution (CVE-2021-41773 & CVE-2021-42013) https://t.co/jb8qIcvI4P via @qualys https://blog.qualys.com/vulnerabilities-threat-research/2021/10/27/apache-http-server-path-traversal-remote-code-execution-cve-2021-41773-cve-2021-42013Marchal___
2021-11-02 18:31:08Threat_Research 1. Apache HTTP Server CVE-2021-42013, CVE-2021-41773 Exploited in the Wild 2. CVE-2021-39341: A vu… https://t.co/e1T6KYWCkl https://twitter.com/i/web/status/1455601601507381250AlirezaGhahrood
2021-10-30 22:50:07Apache HTTP Server Path Traversal & Remote Code Execution (CVE-2021-41773 & CVE-2021-42013) https://t.co/XRPVjq272e https://blog.qualys.com/vulnerabilities-threat-research/2021/10/27/apache-http-server-path-traversal-remote-code-execution-cve-2021-41773-cve-2021-42013matsuu_zatsu
2021-10-30 17:40:04CVE-2020-14882,3 CVE-2021-42013,1AttilaDeak01
2021-10-30 08:00:07🔴APACHE🔴 Múltiples vulnerabilidades de severidad alta en productos APACHE: CVE-2021-42013,CVE-2021-41773,CVE-2021… https://t.co/E56Lf6pIuZ https://twitter.com/i/web/status/1454356212074663938GrupoICA_Ciber
2021-10-29 18:30:19@metasploit @tekwizz123 Woo-hoo! Good work on the official CVE-2021-41773 and CVE-2021-42013 module everyone. That was a fun one.psionicjake
2021-10-29 13:50:08🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/xcDUnuuq2S https://twitter.com/i/web/status/1454082981795188741threatintelctr
2021-10-29 13:20:05🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/7bWerfTpCr https://twitter.com/i/web/status/1454075431880060930threatintelctr
2021-10-28 07:30:25Apache HTTP Server Path Traversal & Remote Code Execution (CVE-2021-41773 & CVE-2021-42013) https://t.co/ORDiauFSsg https://t.co/sh4enjcLaE http://ow.ly/JxYn10338TJTechSpective
2021-10-28 07:20:49https://t.co/2Vih0Zd77g Apache HTTP Server Path Traversal & Remote Code Execution (CVE-2021-41773 & CVE-2021-42013)… https://t.co/S1efOiuPfM https://blog.qualys.com/vulnerabilities-threat-research/2021/10/27/apache-http-server-path-traversal-remote-code-execution-cve-2021-41773-cve-2021-42013 https://twitter.com/i/web/status/1453620076242944002netsecu
2021-10-28 06:32:03Apache HTTP Server Path Traversal & Remote Code Execution (CVE-2021-41773 & CVE-2021-42013) https://t.co/RxO0kaVrzw https://t.co/EmrPxMSHbi http://dlvr.it/SBRPpBAcooEdi
2021-10-28 06:31:45Apache HTTP Server Path Traversal & Remote Code Execution (CVE-2021-41773 & CVE-2021-42013): On October 4, 2021, Ap… https://t.co/45EGIBA7l3 https://twitter.com/i/web/status/1453608356006948865shah_sheikh
2021-10-26 08:00:30🔴APACHE🔴 Múltiples vulnerabilidades de severidad alta en productos APACHE: CVE-2021-42013,CVE-2021-41773 Más inf… https://t.co/ljWFoJBlpG https://twitter.com/i/web/status/1452906898265710593GrupoICA_Ciber
2021-10-25 19:22:36🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/tGAoN9azyc https://twitter.com/i/web/status/1452716473378557962threatintelctr
2021-10-24 13:30:42PoC CVE-2021-42013 reverse shell Apache 2.4.50 with CGI enable. ./CVE-2021-42013_reverseshell.sh http://ip:port/ L… https://t.co/9DhNHOQpJp https://twitter.com/i/web/status/1452264797920186379ThelastVvV
2021-10-23 10:50:06#Apache Explotan activamente vulnerabilidades de día cero en HTTP Server CVE-2021-42013 y CVE-2021-41773 tienen… https://t.co/cOCuPvNBbl https://twitter.com/i/web/status/1451863374275432452secnews4all
2021-10-23 05:21:49Apache HTTP Server CVE-2021-42013 and CVE-2021-41773 Exploited in the Wild https://t.co/NJasc9yHL2 https://blogs.juniper.net/en-us/enterprise-cloud-and-transformation/apache-http-server-cve-2021-42013-and-cve-2021-41773-exploitedCyber_O51NT
2021-10-23 00:00:54
Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013, (Sat, Oct 16th) https://t.co/HtVd46ci3g http://dlvr.it/SB79RcCybershieldUS
2021-10-22 14:25:25CYBERSECURITY ADVISORY: Apache HTTP Server (CVE-2021-41773 & CVE-2021-42013) For details visit:… https://t.co/priHBdeNFS https://twitter.com/i/web/status/1451551561629544460ingallsinfosec
2021-10-22 10:23:02■■■■□ Apache HTTP Server CVE-2021-42013 and CVE-2021-41773 Exploited in the Wild. https://t.co/wwREumgaHQ https://blogs.juniper.net/en-us/enterprise-cloud-and-transformation/apache-http-server-cve-2021-42013-and-cve-2021-41773-exploitedcKure7
2021-10-22 05:40:43Apache HTTP Server CVE-2021-42013 and CVE-2021-41773 Exploited https://t.co/Mxzui6XsTm #infosec #infosecurity… https://t.co/JfiWTiV8lO https://cyberiqs.com/apache-http-server-cve-2021-42013-and-cve-2021-41773-exploited-in-the-wild/ https://twitter.com/i/web/status/1451422485786812416CyberIQs_
2021-10-22 00:00:07[ばばさん通信ダイジェスト] 賛否関わらず話題になった/なりそうなものを共有しています。 Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター https://t.co/9BNh34RDhT https://ift.tt/3amGDvAnetmarkjp
2021-10-21 05:10:03【CVE-2021-41773, CVE-2021-42013】Apache HTTP ServerのRCE脆弱性について - NFLabs. エンジニアブログ https://t.co/NOy5I4jbA0 少し旬が過ぎてし… https://t.co/fEgjo9d4Hj https://blog.nflabs.jp/entry/2021/10/21/132527 https://twitter.com/i/web/status/1451053119803068421takahoyo
2021-10-20 03:50:19after Apache HTTPd Path Traversal (CVE-2021-42013/41773) I review the CVE-2018-19052 Lighttpd path traversal (cr… https://t.co/SCvSlR5oTe https://twitter.com/i/web/status/1450670242070347782chybeta
2021-10-18 10:50:03🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/rJUM5Pq3mn https://twitter.com/i/web/status/1450051412470161414threatintelctr
2021-10-18 07:30:07Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013, (Sat, Oct 16th) https://t.co/GTtViB5v9Z https://ift.tt/2YTlrLsbug_less
2021-10-18 00:50:48Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013 - https://t.co/vTu2Koje77 https://isc.sans.edu/forums/diary/Apache+is+Actively+Scan+for+CVE202141773+CVE202142013/27940/moton
2021-10-17 22:50:10🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/w1PUotqjqu https://twitter.com/i/web/status/1449870222148706305threatintelctr
2021-10-17 17:50:55Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013, (Sat, Oct 16th) https://t.co/AGBzWUw2Zh https://isc.sans.edu/diary/rss/27940L4rryC4rson
2021-10-17 13:30:42【【検証】Apacheのパストラバーサルの脆弱性 (CVE-2021-41773、CVE-2021-42013)を悪用する攻撃通信】 ●https://t.co/vgA6FL4blg https://www.nri-secure.co.jp/blog/apache-http-server-vulnerabilityHAL_CSIRT
2021-10-17 11:20:07🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/XwxVHfH3hO https://twitter.com/i/web/status/1449696575375101958threatintelctr
2021-10-17 10:50:04🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/Q9ETP2v9hA https://twitter.com/i/web/status/1449689026714345472threatintelctr
2021-10-17 10:00:04#CVE-2021-42013: Path Traversal and Remote Code Execution in #Apache #HTTP #Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/tGkv1eD4lv https://twitter.com/i/web/status/1449676039651794944viehgroup
2021-10-17 09:20:06Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013, (Sat, Oct 16th) - https://t.co/hOlslTCK5R https://isc.sans.edu/diary/rss/27940ka0com
2021-10-17 08:00:08🔴APACHE🔴 Múltiples vulnerabilidades de severidad alta en productos APACHE: CVE-2021-42013,CVE-2021-41773 Más inf… https://t.co/Zw4N5JdZVJ https://twitter.com/i/web/status/1449645133176229888GrupoICA_Ciber
2021-10-17 08:00:06Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013, (Sat, Oct 16th) https://t.co/ETRQ7gzvU1 https://isc.sans.edu/diary/rss/27940_mrbyte
2021-10-16 22:50:05🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/1KWZfIfwXE https://twitter.com/i/web/status/1449507830655029251threatintelctr
2021-10-16 21:50:03Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013 Published: 2021-10-16 Last Updated: 2021-10-16 17:13:51… https://t.co/IInnlU1AGE https://twitter.com/i/web/status/1449492762827575299test2v
2021-10-16 19:10:05New post from https://t.co/uXvPWJy6tj (Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013, (Sat, Oct 16th)… https://t.co/aFdzf0wxlk http://www.sesin.at https://twitter.com/i/web/status/1449451386278711301WolfgangSesin
2021-10-16 19:10:04New post from https://t.co/9KYxtdZjkl (Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013, (Sat, Oct 16th)… https://t.co/WaZ55jaAoe http://www.sesin.at https://twitter.com/i/web/status/1449451396198281216www_sesin_at
2021-10-16 18:20:08Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013, (Sat, Oct 16th) https://t.co/KZh8jPadyd #PoseidonTPA #SANS #Cybersecurity http://news.poseidon-us.com/S9jGddPoseidonTPA
2021-10-16 18:20:06Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013, (Sat, Oct 16th) https://t.co/UmbwNGd9nr https://poseidon-us.com/2021/10/16/apache-is-actively-scan-for-cve-2021-41773-cve-2021-42013-sat-oct-16th/PoseidonTPA
2021-10-16 18:10:07Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013, (Sat, Oct 16th) https://t.co/HIZ7y5tv05 #CyberSecurity https://t.co/YiAOoIfNoa http://twib.in/l/48y79pXpjno7aglongo
2021-10-16 17:20:12Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013 https://t.co/Qy0jEBaFXk https://t.co/Ty5Juj6EK9 https://i5c.us/d27940sans_isc
2021-10-16 17:20:06ISC Diary - Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013 #apache #cve-2021-41773 #cve-2021-42013… https://t.co/Fpv0OBWMZk https://twitter.com/i/web/status/1449424822287622146GuyBruneau
2021-10-16 16:30:06Apache HTTP Server 2.4.50 [CVE-2021-42013] Path Transversal and if CGI scripts are enabled for these aliased paths,… https://t.co/4krlmijO4P https://twitter.com/i/web/status/14494104707801047041337in
2021-10-16 14:50:07🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/JlCGMZWmde https://twitter.com/i/web/status/1449387033835704323threatintelctr
2021-10-16 14:00:04Critical CVE reported: CVE-2021-42013 #Apache Desc: An attacker could use a path traversal attack to map URLs to f… https://t.co/xzQ4In2Hqv https://twitter.com/i/web/status/1449374571950485508pottrsec
2021-10-16 10:50:04🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/UI0WokpuG0 https://twitter.com/i/web/status/1449326639452676100threatintelctr
2021-10-16 09:00:06見: Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/XiGtHxrWHk https://piyolog.hatenadiary.jp/entry/2021/10/10/031834hiro_y
2021-10-16 08:50:04パストラバーサルとRCE(リモートコード実行 )の脆弱性の件。 / “Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” https://t.co/4emizXFvd4 https://htn.to/2ikeVs9UCf__gfx__
2021-10-16 08:00:12🔴APACHE🔴 Múltiples vulnerabilidades de severidad alta en productos APACHE: CVE-2021-42013,CVE-2021-37608,CVE-2021… https://t.co/OQ7t1671EX https://twitter.com/i/web/status/1449283056896970752GrupoICA_Ciber
2021-10-16 07:30:35Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/5WaniruxDs https://twitter.com/i/web/status/1449274420506230786oss_security
2021-10-16 02:10:03アクセスログ見るとわかるけど本当にガンガンきてる。 / “Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” https://t.co/A1F1kKCFLO https://htn.to/wkUbVWoiyEmatsuu
2021-10-15 22:20:03🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/whp5IsQbQ1 https://twitter.com/i/web/status/1449137893574942725threatintelctr
2021-10-15 19:40:09New post from https://t.co/uXvPWJy6tj (CVE-2021-42013 (fedora, http_server)) has been published on https://t.co/aMFANuAUJt http://www.sesin.at https://www.sesin.at/2021/10/15/cve-2021-42013-fedora-http_server/WolfgangSesin
2021-10-15 19:40:06New post from https://t.co/9KYxtdZjkl (CVE-2021-42013 (fedora, http_server)) has been published on https://t.co/6PHd3kSr2y http://www.sesin.at https://www.sesin.at/2021/10/15/cve-2021-42013-fedora-http_server/www_sesin_at
2021-10-15 19:20:06Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/9mEbg52vCu https://twitter.com/i/web/status/1449091213504618498oss_security
2021-10-15 18:30:11Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/DUFiD5Cgrt https://wizsafe.iij.ad.jp/2021/10/1285/U_D_D_T
2021-10-15 16:50:18🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/WbxWcZCm9n https://twitter.com/i/web/status/1449054844644384771threatintelctr
2021-10-15 06:20:06While everyone had a look at CVE-2021-41773 and CVE-2021-42013, this here is as good (at least for cloud environmen… https://t.co/Ij2I5hjJzu https://twitter.com/i/web/status/1448895383799844865h0ng10
2021-10-15 01:30:05@wugeej Only scanning for CVE-2021-42013 from that IP – no scanning activity for CVE-2021-41773 or any other CVE.bad_packets
2021-10-14 19:30:09Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/lYiIq36Z70 https://piyolog.hatenadiary.jp/entry/2021/10/10/031834HyoYoshikawa
2021-10-14 15:20:26φ(..) 【検証】Apacheのパストラバーサルの脆弱性 (CVE-2021-41773、CVE-2021-42013)を悪用する攻撃通信https://t.co/2ii3STwEzA https://www.nri-secure.co.jp/blog/apache-http-server-vulnerabilitystuons
2021-10-14 07:10:44#Apache CVE-2021-42013 みたいなものも来てた。 送信元:185.180.143.136 / AS 211680 ( Sistemas Informaticos, S.A. )… https://t.co/2AuQRcJ6Rw https://twitter.com/i/web/status/1448545215606788096KanbeWorks
2021-10-14 05:30:12[Apache] HTTP Server cgi-bin Path Traversal and RCE (CVE-2021-42013) This exploit can bypass for Apache HTTP Serve… https://t.co/3IwsudxuF5 https://twitter.com/i/web/status/1448519884808146944wugeej
2021-10-13 18:30:06CVE-2021-42013 & CVE-2021-41773 are being actively exploited in the wild: https://t.co/b9pjLi11yx https://downloads.apache.org/httpd/CHANGES_2.4.51HacKurx
2021-10-13 14:40:06“Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” https://t.co/TM4gaZXZxp https://htn.to/2w18Sj1jabkwdnet
2021-10-13 08:40:42SIOSセキュリティブログを更新しました。 Apache HTTP Serverの脆弱性情報(CVE-2021-41773, CVE-2021-42013)とPoC #sios_tech #security… https://t.co/VO4Zpk5e4R https://twitter.com/i/web/status/1448205539545010179omokazuki
2021-10-12 18:52:49amazn2-coreのapacheバージョンは2.4.48みたいなので、CVE-2021-41773、CVE-2021-42013の脆弱性の影響は受けずに済みそう。84kure
2021-10-12 13:43:41“Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見” https://t.co/UAy1ScwiSX https://htn.to/4s9RoHkFJ9zu2
2021-10-12 12:30:26【検証】Apacheのパストラバーサルの脆弱性 (CVE-2021-41773、CVE-2021-42013)を悪用する攻撃通信 - https://t.co/ABxZ5s6EGR https://www.nri-secure.co.jp/blog/apache-http-server-vulnerabilityka0com
2021-10-12 11:20:17【検証】Apacheのパストラバーサルの脆弱性 (CVE-2021-41773、CVE-2021-42013)を悪用する攻撃通信 https://t.co/47UGnBX3Ya https://www.nri-secure.co.jp/blog/apache-http-server-vulnerabilityamannk
2021-10-12 10:20:54Apache HTTP Serverにパストラバーサルが可能な脆弱性(CVE-2021-41773、CVE-2021-42013)が公開されました。当社SOCでもこの脆弱性を悪用する通信を多数検知しています。本脆弱性の検証結果、お… https://t.co/aMYjQkuXgb https://twitter.com/i/web/status/1447868334343483397NRIST
2021-10-12 02:30:39#セキュリティのアレ で取り上げられていたからやっとこさApacheの脆弱性(CVE-2021-41773, CVE-2021-42013)を確認した。参照できるだけじゃなくてRCEもあるのか…nishim
2021-10-12 00:40:48New post from https://t.co/9KYxtdZjkl (CVE-2021-42013) has been published on https://t.co/Q3Q2NqMUMX http://www.sesin.at https://www.sesin.at/2021/10/12/cve-2021-42013/www_sesin_at
2021-10-12 00:40:47New post from https://t.co/uXvPWJy6tj (CVE-2021-42013) has been published on https://t.co/1ReCzhPXaY http://www.sesin.at https://www.sesin.at/2021/10/12/cve-2021-42013/WolfgangSesin
2021-10-11 20:17:58UPDATE NOW: CVE-2021-42013 Vulnerability in Apache httpd Allows Access Outside the Site Root Directory https://t.co/VruANk2ogA #Linux https://www.linuxtoday.com/developer/update-now-cve-2021-42013-vulnerability-in-apache-httpd-allows-access-outside-the-site-root-directory/linuxtoday
2021-10-11 19:14:52Apache HTTP Server Path Normalization and Remote Code Execution (RCE) Vulnerability (CVE-2021-42013)… https://t.co/14eER3x50y https://twitter.com/i/web/status/1447638166878494729qualys
2021-10-11 13:30:08ZDA pack + Canvas in action: videos for Apache 2.4.49 RCE CVE-2021-41773, 2.4.50 RCE CVE-2021-42013 : https://t.co/f6DF5QAXpu https://vimeo.com/user7532837/videosGlegExploitPack
2021-10-11 13:00:16Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/neFEtwN8uv https://twitter.com/i/web/status/1447545153657315332oss_security
2021-10-11 10:33:14Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/lsfNMtOOm9 https://piyolog.hatenadiary.jp/entry/2021/10/10/031834ksk_bfb
2021-10-11 10:30:10CVE-2021-41773, CVE-2021-42013 "Apache/2.4.50" country:"JP" 361件 "Apache/2.4.51" country:"JP" 316件 対策したサーバ、増えたな。 ※… https://t.co/3fkaXuLVRk https://twitter.com/i/web/status/1447509600224169984hands_of_cat
2021-10-11 10:10:03Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/0ztUKSvt9c https://wizsafe.iij.ad.jp/2021/10/1285/ueyasu
2021-10-11 09:00:11Apache 2.4.49/2.4.50 postmortem CVE-2021-41773 and CVE-2021-42013 https://t.co/tXy4Yu9Pbw https://github.com/icing/blog/blob/main/httpd-2.4.50.mdiamamoose
2021-10-11 08:40:05GitHub - andrea-mattioli/apache-exploit-CVE-2021-42013: Exploit with integrated shodan search https://t.co/zYSPWjemYa https://github.com/andrea-mattioli/apache-exploit-CVE-2021-42013Securityblog
2021-10-11 06:50:05Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/ilNBiwSIEy https://piyolog.hatenadiary.jp/entry/2021/10/10/031834Pyo0072
2021-10-11 05:30:06Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた – piyolog https://t.co/Iumziy44sT https://piyolog.hatenadiary.jp/entry/2021/10/10/031834seo_jp_news
2021-10-11 04:30:07ふむふむ。。。 RT: Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/ecyikhrMyv https://piyolog.hatenadiary.jp/entry/2021/10/10/031834tsaka1
2021-10-11 02:30:06Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/BZ2L5NnuyE https://piyolog.hatenadiary.jp/entry/2021/10/10/031834taku888infinity
2021-10-11 01:50:08Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/3d5105ermZ https://piyolog.hatenadiary.jp/entry/2021/10/10/031834giw_news
2021-10-11 01:00:05夜行性インコさんのまとめ。先日から騒ぎになっているApacheの脆弱性について。PoCへのリンクもあり:Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめて… https://t.co/HHqHqniZAk https://twitter.com/i/web/status/1447366059560816642tamosan
2021-10-11 00:30:06Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/MvgnCkkb2D https://piyolog.hatenadiary.jp/entry/2021/10/10/031834oha000
2021-10-11 00:20:09Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/XwyBz8E4la https://piyolog.hatenadiary.jp/entry/2021/10/10/031834kit1t
2021-10-10 23:50:34Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた https://t.co/za9ENIO2mE https://piyolog.hatenadiary.jp/entry/2021/10/10/031834kaakaa_hoe_prog
2021-10-10 23:10:26他のスコアが高い脆弱性は、このサイトぐらい詳しく情報を提供してほしいなって常々思う。 特に攻撃方法とか。 Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめ… https://t.co/hBXemHqFlt https://twitter.com/i/web/status/1447337838928818182yk_style2011
2021-10-10 22:30:33Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた https://t.co/xUyjLuk39r https://piyolog.hatenadiary.jp/entry/2021/10/10/031834yosilove
2021-10-10 22:00:35Path Traversal Zero-Day en Apache HTTP Server | CVE-2021-41773|CVE-2021-42013 https://t.co/zcNVxxtTqI #cve… https://t.co/1q2wCy40Ou https://www.creadpag.com/2021/10/path-traversal-zero-day-en-apache-http.html https://twitter.com/i/web/status/1447319541575557121creadpag
2021-10-10 20:50:301件のコメント https://t.co/jRPX9n0Hnu “Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” (42 u… https://t.co/GzOxOgQ7Vz https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2021%2F10%2F10%2F031834&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20apache https://twitter.com/i/web/status/1447302371730595938tukaelu
2021-10-10 16:20:061件のコメント https://t.co/dPS68MdXoo “Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” (39 u… https://t.co/YGbpVa2l93 https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2021%2F10%2F10%2F031834&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20apache https://twitter.com/i/web/status/1447235136974573577RyoTa63292153
2021-10-10 15:00:24はいきた! 私の仕事が増えるやーつ💢 #お仕事の話 Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた https://t.co/7CE2x4FNl7 https://piyolog.hatenadiary.jp/entry/2021/10/10/031834sakuranbon50
2021-10-10 14:50:28Apache server version 2.4.51 (CVE-2021-42013) https://t.co/fjeJGWJIP9TheXXLMAN
2021-10-10 13:30:06Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/KBrMUkEGWk https://ift.tt/30cUovanerubesa
2021-10-10 13:10:22Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた https://t.co/XVGbcNaHSr https://t.co/Kpd0i2x2hR https://piyolog.hatenadiary.jp/entry/2021/10/10/031834 https://b.hatena.ne.jp/entry/s/piyolog.hatenadiary.jp/entry/2021/10/10/031834avalon1982
2021-10-10 13:10:12【更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773, CVE-2021-42013)】 ・バージョン 2.4.50 にて、修正が不十分であることが公表(CVE-2021-42013)さ… https://t.co/dKOzpXLFlm https://twitter.com/i/web/status/1447186444133433347HAL_CSIRT
2021-10-10 10:20:44@NevenaSofranic Jesi li patch-ovala ove nove propuste? CVE-2021-42013 😂 Sada znaš iz iskustva iz sna (snilog iskus… https://t.co/lQFuaMbZPx https://twitter.com/i/web/status/1447143906718720005bashgrylls
2021-10-10 10:00:35まとめ助かる / “Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” https://t.co/BuftPZRDpG https://htn.to/3xvZKCt31at_motooka
2021-10-10 09:10:11Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/6EXLoW7N6d https://piyolog.hatenadiary.jp/entry/2021/10/10/031834nmatayoshi
2021-10-10 07:51:04🚨 Active scanning of Apache HTTP Server CVE-2021-41773 & CVE-2021-42013 is ongoing and expected to accelerate, like… https://t.co/qTQV7q8gxF https://twitter.com/i/web/status/1447106846293172225hernanespinoza
2021-10-10 07:03:20Apache httpd の脆弱性に注意(CVE-2021-42013): Apache httpd 2.4.50 のリリースから数日しか経っていませんが、2.4.51 がリリース... https://t.co/w1ucfz4TtC https://blog.cles.jp/item/12768?utm_source=rss?utm_source=SocialDoghsur
2021-10-10 06:51:59“Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” https://t.co/GUL8qFLAky https://htn.to/3rKd8dWkqzmodokey
2021-10-10 06:51:24“Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog” https://t.co/rLk7123jqK https://htn.to/21EFtXmzD7modokey
2021-10-10 06:40:33Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/dDIIHt3rFk https://piyolog.hatenadiary.jp/entry/2021/10/10/031834ohhara_shiojiri
2021-10-10 06:24:46Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/XiXwCgCC9V https://piyolog.hatenadiary.jp/entry/2021/10/10/031834shunta08101
2021-10-10 06:01:05Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/Z9C3SJXj2x https://piyolog.hatenadiary.jp/entry/2021/10/10/031834sutest1101
2021-10-10 05:41:12“Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” https://t.co/4DgP5275gp https://htn.to/3ym3Gcb2nomiraihack
2021-10-10 05:31:08“Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” https://t.co/KdX17kSf0W https://htn.to/2WxGdpp71Pequinox79
2021-10-10 05:30:40Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/NLjXOYgmF5 パス(ディレクトリ)トラバーサ… https://t.co/YATUrdvTdu https://piyolog.hatenadiary.jp/entry/2021/10/10/031834 https://twitter.com/i/web/status/1447071137934938117yomoyomo
2021-10-10 05:11:52Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/cHm5fBLrD8 https://piyolog.hatenadiary.jp/entry/2021/10/10/031834it_hatebu
2021-10-10 03:30:32Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog https://t.co/ljdXB47twJ https://eng-blog.iij.ad.jp/archives/10987aiujp1985
2021-10-10 03:00:45Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/FyP2ZIpuk4 https://ift.tt/30cUovamagiauk
2021-10-10 02:50:50Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - https://t.co/zylIMjWF3x https://piyolog.hatenadiary.jp/entry/2021/10/10/031834ka0com
2021-10-10 02:40:15Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/DoItKXiAye https://piyolog.hatenadiary.jp/entry/2021/10/10/031834ton960
2021-10-10 02:10:14New post: 【後で読みたい!】更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773, CVE-2021-42013) https://t.co/ir3uxUNdNA https://www.taksbar.link/?p=179868tak_mita
2021-10-10 01:30:21Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた https://t.co/QSe43BfISf https://piyolog.hatenadiary.jp/entry/2021/10/10/031834matsuu_zatsu
2021-10-10 01:00:11Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/aHjigmIFsj 数日前に話題になっていたやつだ。自分の検証環境で後で試してみる。 https://piyolog.hatenadiary.jp/entry/2021/10/10/031834lemonade_air
2021-10-10 00:10:19Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/YSG41RH71L https://piyolog.hatenadiary.jp/entry/2021/10/10/031834matiere
2021-10-09 23:30:19修正が不十分だから、CVE-2021-42013 が公開された。ただそれも不十分の模様。 Red Hat はそもそもの脆弱性の影響を受けないので、影響受けないんだろうな。 RHEL8 は、v2.4.37 をベースに Red H… https://t.co/S8VwJK1c0I https://twitter.com/i/web/status/1446980609692225537hands_of_cat
2021-10-09 23:00:12Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/sNGjV5YxF8 https://piyolog.hatenadiary.jp/entry/2021/10/10/031834tethys_seesaa
2021-10-09 18:50:24Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/2Eo3Ii4ft2 https://piyolog.hatenadiary.jp/entry/2021/10/10/031834muupapa
2021-10-09 18:50:11Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/3zkYvatXLD https://twitter.com/i/web/status/1446910469944459267oss_security
2021-10-09 18:20:04はてなブログに投稿しました #はてなブログ Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/zvnCDiZrDi https://piyolog.hatenadiary.jp/entry/2021/10/10/031834piyokango
2021-10-09 14:30:05オレもオレもCVE-2021-420130x009AD6_810
2021-10-09 12:30:12Dockerを使ってCVE-2021-42013を検証する - https://t.co/kcK3HoHMVR https://nekotosec.com/validate-cve-2021-42013-using-docker/?utm_source=rss&utm_medium=rss&utm_campaign=validate-cve-2021-42013-using-dockerka0com
2021-10-09 12:10:25New based #vulnerability identifier, CVE-2021-42013, it builds on CVE-2021-41773, which was a vulnerability in… https://t.co/wP4D53b3bu https://twitter.com/i/web/status/1446808784970600462Mawg0ud
2021-10-09 12:00:05@eng_bunawaf يوجد تحديثين مختلفة يمكنك الاطلاع ⤵️👍 CVE-2021-41773 https://t.co/HoTpRE9axW CVE-2021-42013 https://t.co/zIolLpZrgk https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41773 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42013hmoud1996
2021-10-09 09:20:10This many #Apache 2.4.49/2.4.50: 350,000+ #CVE-2021-41773 #CVE-2021-42013 https://t.co/hBHz6vBmUvonyphe
2021-10-09 07:31:402.4.50だめだったんか Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/hogllRpE2K https://wizsafe.iij.ad.jp/2021/10/1285/suzu_GBA2003
2021-10-09 05:22:29#أمن_المعلومات #برمجة Apache HTTP Server 2.4.49 and 50 - Path Traversal CVE-2021-41773 /.%2e CVE-2021-42013 /.%%3… https://t.co/ItPTaVVFJf https://twitter.com/i/web/status/1446706565642432512infosec_90
2021-10-09 05:01:29Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 - IIJ https://t.co/NqGaSoNCNt https://wizsafe.iij.ad.jp/2021/10/1285/kawn2020
2021-10-09 04:11:16NowBrowsing: "更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773, CVE-2021-42013):IPA 独立行政法人 情報処理推進機構" https://t.co/Ushiy2kObU https://www.ipa.go.jp/security/ciadr/vul/alert20211006.htmlyoshiteru
2021-10-09 03:32:55Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 - IIJ https://t.co/NqGaSoNCNt https://wizsafe.iij.ad.jp/2021/10/1285/kawn2020
2021-10-09 02:50:21CVE-2021-42013へのこの流れってウェブ路地でもやってたよな なんやねんshimau_
2021-10-09 01:24:35更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773, CVE-2021-42013) - 独立行政法人情報処理推進機構(IPA) https://t.co/jD1s3yoaUa https://www.ipa.go.jp/security/ciadr/vul/alert20211006.htmlkawn2020
2021-10-09 00:51:39Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/YF4D3edwYm https://twitter.com/i/web/status/1446638424882962433oss_security
2021-10-09 00:51:32Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/KTWJqUCYCd https://twitter.com/i/web/status/1446638430444605442oss_security
2021-10-09 00:51:04add. Apache 2.4.49 CVE-2021-41773 and Apache 2.4.50 CVE-2021-42013 – SCANNER/TRAVERSAL/RCE by mekhalleh · Pull Requ… https://t.co/WaA8JZcBUR https://twitter.com/i/web/status/1446638505837408265d34dr4bbit
2021-10-09 00:50:36Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog https://t.co/g9z5NRLEj5 https://eng-blog.iij.ad.jp/archives/10987stm_si
2021-10-09 00:41:10Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog https://t.co/xForDAZCqg https://eng-blog.iij.ad.jp/archives/10987kontonb
2021-10-08 23:30:32Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 https://t.co/skbjOdb108 https://ift.tt/3AndgUsnerubesa
2021-10-08 22:10:56“Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見” https://t.co/m1NvGlucoV https://htn.to/26MnBCmbwKteramako
2021-10-08 21:50:46Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/8CqHad9jQu https://twitter.com/i/web/status/1446593250865795073oss_security
2021-10-08 21:50:41Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/pbMAEEwJzW https://twitter.com/i/web/status/1446593256393900038oss_security
2021-10-08 21:50:37Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/m4b3zOJKfT https://twitter.com/i/web/status/1446593261930311683oss_security
2021-10-08 21:21:06Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 https://t.co/y9isMapo97 https://wizsafe.iij.ad.jp/2021/10/1285/it_hatebu
2021-10-08 21:21:01“Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog” https://t.co/IBZZ1KsFJ4 https://htn.to/4uQr8gVcJHtmhwq
2021-10-08 20:13:49CVE-2021-42013) apache 2.4.49. vs apache 2.4.50 #BugBounty #infosec https://t.co/zD3WOJzWIxr00t_nasser
2021-10-08 20:12:00Algunos Payloads para el CVE-2021-42013 de Apache 2.4.50 https://t.co/q759wPXYEL añádelo a tu Burpbounty Free o PRO https://t.co/zhSRCjWMuN https://t.me/dragonjar/10187 https://twitter.com/BurpBounty/status/1445702174193815552DragonJAR
2021-10-08 20:02:16The reason for the second fix to Apache server version 2.4.51 (CVE-2021-42013) https://t.co/3uAGZTzFnzcyb3rops
2021-10-08 19:53:06Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog https://t.co/nvQKmEGhl4 https://eng-blog.iij.ad.jp/archives/10987it_hatebu
2021-10-08 19:31:32CVE-2021-41773, CVE-2021-42013 https://t.co/UMjkLkPeM1 https://www.jpcert.or.jp/at/2021/at210043.htmlyumetov
2021-10-08 16:40:25RCE exploit both for Apache 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013). Have fun 😎 and secure your work en… https://t.co/awpd92Fc8L https://twitter.com/i/web/status/1446514818891096080osamah_Alshaya
2021-10-08 16:00:13Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog https://t.co/84zdCj0XOL https://ift.tt/3amGDvAmagiauk
2021-10-08 15:38:47Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/W0e6Alh5yo https://wizsafe.iij.ad.jp/2021/10/1285/miki158s
2021-10-08 14:30:29CVE-2021-42013は俺が見つけた的なこと世界のあちこちで言ってる人がいそうyousukezan
2021-10-08 14:11:42A short video demo of the CVE-2021-42013 Apache 2.4.50 POC https://t.co/7tWgHjILJf https://youtu.be/MFBUuJyWPkkastr0baby
2021-10-08 14:00:26🚨اذا كنت تستخدم Apache HTTP Server قم بتحديثه واغلاق الثغرات CVE-2021-41773 & CVE-2021-42013. حيث يقوم المهاجمين ب… https://t.co/QZwNvuJrp0 https://twitter.com/i/web/status/1446474781642141699MAlajab
2021-10-08 13:20:44“Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見” (16 users) https://t.co/FTtmTBOpEv https://htn.to/3MQnH6ATHgburnworks
2021-10-08 12:45:31めっちゃやり方書いてある!! Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- I… https://t.co/Ky9PgeftiX https://twitter.com/i/web/status/1446452834854080518kunio99
2021-10-08 12:41:55Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/BPVRo5lERF https://wizsafe.iij.ad.jp/2021/10/1285/LuciferAlpha
2021-10-08 12:31:35I just update the PoC to introduce the CVE-2021-42013 (Traversal/RCE into Apache 2.4.49/2.4.50) Support more check… https://t.co/KfAGaC4qyE https://twitter.com/i/web/status/1446452062020067328Mekhalleh
2021-10-08 11:50:18مهم ⚠️ 🚨 Active scanning of #Apache HTTP Server CVE-2021-41773 & CVE-2021-42013 is ongoing and expected to accelera… https://t.co/gSgjGNl83D https://twitter.com/i/web/status/1446442231750184987cybersec2030
2021-10-08 11:41:34Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/14SdiIZ2e6 https://wizsafe.iij.ad.jp/2021/10/1285/MASA89434701
2021-10-08 11:31:36Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ… https://t.co/oOlj62WZqF https://twitter.com/i/web/status/1446436421661646856takahoyo
2021-10-08 10:50:30Apache 2.4.50 (CVE-2021-42013) RCE playground https://t.co/oOnOZoVs5f #bugbountytips https://github.com/RedSection/poc/blob/main/cve-2021-41773evrnyalcin
2021-10-08 10:41:45“Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見” https://t.co/mTFNVCBGIy https://htn.to/3kHqhoGjUPwaiha8
2021-10-08 10:41:33Apache HTTP Zero-day CVE-2021-41773 fix Bypassed With CVE-2021-42013 https://t.co/O3qINzh9Q9 #Apache #security #bugbounty #zeroday https://www.cyberkendra.com/2021/10/apache-http-zero-day-cve-2021-41773-fix.htmlcyberkendra
2021-10-08 10:23:26@CFCSsitcen Den nye RCE er CVE-2021-42013 (incomplete fix af CVE-2021-41773) https://t.co/6A774lFEMS - værd at nævne. https://seclists.org/oss-sec/2021/q4/17emilstahl
2021-10-08 10:01:49Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/QMjtPYawSF https://twitter.com/i/web/status/1446413819308232711oss_security
2021-10-08 09:51:31_φ(・_・ Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 https://t.co/AJWGQfJRO0 https://wizsafe.iij.ad.jp/2021/10/1285/kabukawa
2021-10-08 08:51:14Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog https://t.co/3mZew29wht https://eng-blog.iij.ad.jp/archives/10987nekochanSec555
2021-10-08 08:31:22PoC(CVE-2021-42013)と動画を追加 Apache HTTP Serverの脆弱性情報(Critical: CVE-2021-42013, Important: CVE-2021-41773, Moderate:… https://t.co/Bh604HuZqc https://twitter.com/i/web/status/1446391259363307526omokazuki
2021-10-08 08:30:44PoC(CVE-2021-42013)動画をアップしました。 #sios_tech #security #vulnerability #セキュリティ #脆弱性 #apache #httpd #web https://t.co/V9tyGgimYZ https://www.youtube.com/watch?v=PqlAj6R54-womokazuki
2021-10-08 08:11:45Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 - https://t.co/nH9r4pyeVg https://wizsafe.iij.ad.jp/2021/10/1285/ka0com
2021-10-08 08:11:34Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog - https://t.co/b8HEomqnJ1 https://eng-blog.iij.ad.jp/archives/10987ka0com
2021-10-08 08:00:49Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 https://t.co/lKiM845XPA https://ift.tt/3AndgUsmagiauk
2021-10-08 07:51:50Patch your apache! CVE-2021-42013 https://t.co/nyxakqmzz0vx_herm1t
2021-10-08 07:51:36@Ax_Sharma @hackerfantastic @wdormann Looks like it's been confirmed with latest advisory (CVE-2021-42013):… https://t.co/4rk4zHNuRQ https://twitter.com/i/web/status/1446379892225028127timb_machine
2021-10-08 07:33:08『WAF「Scutum」では、CVE-2021-42013の脆弱性についても、既存の防御機能により本脆弱性公開前から攻撃を防御できていることを確認しております。』 https://t.co/RfFif8x7tX https://www.scutum.jp/information/technical_articles/index.htmlkinyuka
2021-10-08 07:31:52Apacheのど派手な脆弱性2連発(CVE-2021-41773,CVE-2021-42013)でしたが、幸いScutumではどちらもゼロデイ防御可能なものでした。2つめはけっこう止められなかったWAFもあるんじゃないかな? https://t.co/QCdqpfwoIL https://twitter.com/kinyuka/status/1446376229947408386kinyuka
2021-10-08 07:22:13Hey let's fix CVE-2021-41773 Apache HTTP Server 2.4.49 Fix path traversal... NOT... and get CVE-2021-42013 up to 2… https://t.co/VcV0ktO0c6 https://twitter.com/i/web/status/1446373888213069853_superhero1
2021-10-08 07:21:55更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773, CVE-2021-42013):IPA 独立行政法人 情報処理推進機構 https://t.co/OzoEVvwRkm https://www.ipa.go.jp/security/ciadr/vul/alert20211006.htmlohhara_shiojiri
2021-10-08 07:21:39「バージョン 2.4.50 にて、修正が不十分であることが公表(CVE-2021-42013)され、こちらを修正したバージョン 2.4.51 がリリースされました。」ohhara_shiojiri
2021-10-08 07:20:17@stanner_austin @chybeta The PoC of CVE-2021-42013 has been published in Twitter... You can search it.m01e_exp
2021-10-08 07:06:58Exploiting #RCE exploit for #Apache 2.4.49 (#CVE-2021-41773) and 2.4.50 (CVE-2021-42013) in windows machine.… https://t.co/VGRx1bVyie https://twitter.com/i/web/status/1446367576158842881gweeperx
2021-10-08 07:04:41#Apache has released Apache #HTTP Server 2.4.51 to address vulnerabilities (CVE-2021-41773, CVE-2021-42013) in Apac… https://t.co/kGQPGH7xqC https://twitter.com/i/web/status/1446367830442717221nerccu
2021-10-08 06:55:19Vulnerabilidad en Apache (2.4.49) que permitiría a un atacante exfiltrar información. CVE-2021-42013 https://t.co/wADFThfi31 http://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-41773RaulRenales
2021-10-08 06:54:04“更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773, CVE-2021-42013):IPA 独立行政法人 情報処理推進機構” (1 user) https://t.co/ed3LDI1ATA https://htn.to/4967on9TX2RyoTa63292153
2021-10-08 06:51:32RCE exploit both for Apache 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013): curl 'https://t.co/ZW4ay1YXtA' --d… https://t.co/bKMOoY3OcE http://host.com/cgi-bin/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/bin/sh https://twitter.com/i/web/status/14463664777711779850xhunster
2021-10-08 06:51:01ご報告 CVE-2021-42013の発見者1人として名を残しました。お溢れみたいな発見でしたが、自身の中で目標としていた“2年以内にCVE発見に関わる”をクリアできました。 自身の所属会社での記事を宣伝します。 記事内に、少し… https://t.co/jLl7s4t5Li https://twitter.com/i/web/status/1446366551704158222hinoshiba
2021-10-08 06:40:55Apache HTTP Server 2.4.50の脆弱性"CVE-2021-42013"の発見は、IIJ SOC(セキュリティオペレーションセンター)の業務の一環として行われました。IIJ SOCの脆弱性調査の模様を、別記事にて… https://t.co/Z4WrlkmcR7 https://twitter.com/i/web/status/1446364677861097473IIJ_doumae
2021-10-08 06:35:09「Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター」 IIJ SOCのアナリスト熊坂駿吾が報告したCVE-2021-42013の紹介と、本報告に関係するS… https://t.co/kTD0HCqdfO https://twitter.com/i/web/status/1446360005070909442IIJ_ITS
2021-10-08 06:34:33Patch for CVE-2021-41773 introduces RCE. Patch now for CVE-2021-42013. A patchy server indeed.tongson
2021-10-08 06:34:23「IIJ Engineers Blog」に「Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター」を掲載しました。 ぜひご覧ください。… https://t.co/nVqq9mCU45 https://twitter.com/i/web/status/1446360335821066241IIJ_PR
2021-10-08 06:20:32#セキュリティ 情報発信サイト「wizSafe Security Signal」に「Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見」を掲載しました。 IIJ… https://t.co/oVyQ7SBG0j https://twitter.com/i/web/status/1446359351732498439IIJ_PR
2021-10-08 06:03:58See the patch on the patch again:incomplete fix of CVE-2021-41773 --> CVE-2021-42013 https://t.co/DXriwrnvay So Apache 2.4.50 also fell https://httpd.apache.org/security/vulnerabilities_24.html80vul
2021-10-08 06:03:51Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ… https://t.co/pWp952FgRC https://twitter.com/i/web/status/1446352571996672008nekochanSec555
2021-10-08 06:03:42Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/jHTqqePU9J https://wizsafe.iij.ad.jp/2021/10/1285/piyokango
2021-10-08 05:53:18CVE-2021-42013 & CVE-2021-41773 Apache HTTPd  Path Traversal and Remote Code Execution #Apache #vulnerability https://t.co/v7eurGOex00xhunster
2021-10-08 05:50:56Reproduce CVE-2021-42013 Apache 2.4.50 path traversal vulnerability. Path traversal vulnerability GET /cgi-bin/%%… https://t.co/ypIraUaaYP https://twitter.com/i/web/status/1446351656568852483RapidSafeguard
2021-10-08 05:50:09Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/zL8hNW3Icf https://wizsafe.iij.ad.jp/2021/10/1285/ohhara_shiojiri
2021-10-08 05:30:08脆弱性の修正が不十分だった今回の問題は、IIJ の SOC メンバーが(も)発見し報告しました。GJ! Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 –… https://t.co/CjE0rOPDbB https://twitter.com/i/web/status/1446347069556355072MasafumiNegishi
2021-10-08 05:11:10Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/WrJu0Y0Sel https://wizsafe.iij.ad.jp/2021/10/1285/oubon21120991
2021-10-08 05:10:54「本脆弱性の修正として提供したバージョン2.4.50に、別のパストラバーサルの脆弱性(CVE-2021-42013)があることが判明したことを発表し、本脆弱性を修正するバージョン2.4.51をリリース」 Apache HTTP… https://t.co/JxLfZ1D5Gd https://twitter.com/i/web/status/1446340555324018689nilab
2021-10-08 04:24:40Apache HTTP Server 2.4.50 の「別のパストラバーサル」の脆弱性( CVE-2021-42013 )、%%32%45 や %%32%65 や %2%45 や %2%65 や %%32e や %%32E といっ… https://t.co/3TLM2PfNME https://twitter.com/i/web/status/1446327543951286275ymzkei5
2021-10-08 04:13:45Additional fixes to Apache HTTP Server for CVE-2021-41773, which is tracked as CVE-2021-42013 Bulletin:… https://t.co/AQSAIZwncj https://twitter.com/i/web/status/1446326504866992131AusCERT
2021-10-08 04:05:16CVE-2021-42013 & CVE-2021-41773 Apache HTTPd  Path Traversal and Remote Code Execution https://t.co/kKhaIBSzppchybeta
2021-10-08 03:57:44わずか3日、「Apache HTTPD」が再修正 - 前回修正は不十分、あらたにRCEのおそれも:Security NEXT https://t.co/jqpwozpckt “CVE番号「CVE-2021-42013」があらたに… https://t.co/pA3KxuP8mh https://www.security-next.com/130520 https://twitter.com/i/web/status/1446319751664312322catnap707
2021-10-08 03:44:31「vulnerabilities (CVE-2021-41773, CVE-2021-42013) in Apache HTTP Server 2.4.49 and 2.4.50」→Apache Releases HTTP Ser… https://t.co/gOsH1m1B3G https://twitter.com/i/web/status/1446317057830580229k1rou
2021-10-08 03:43:39RCE exploit both for Apache 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013): POC... We got a Reverse Shell! https://t.co/rakLyIz62v https://youtu.be/WSVcuV2Wc58CCNADailyTIPS
2021-10-08 03:11:38Apache HTTPD 2.4.51がリリースされました。パストラバーサル及びリモートからのコード実行の脆弱性(CVE-2021-42013)が修正されています。 「インストールするもの」を更新しました。 https://t.co/FeWMd4NuAK https://http2.try-and-test.net/install.html#apacheken1no
2021-10-08 02:52:30「更新: 2021年10月8日追記 本脆弱性の修正として提供したバージョン2.4.50に、別のパストラバーサルの脆弱性(CVE-2021-42013)があることが判明したことを発表し、本脆弱性を修正するバージョン2.4.51をリリースしました。」ohhara_shiojiri
2021-10-08 01:40:29“Vulnerabilities (CVE-2021-41773) & CVE-2021-42013) have been identified in Apache HTTP Server, one of the most com… https://t.co/aNcL1LKwkb https://twitter.com/i/web/status/1446288933680291840christinayiotis
2021-10-08 01:40:21【追記】 パストラバーサルおよびリモートコード実行の脆弱性(CVE-2021-42013):パストラバーサルの脆弱性の修正が不十分であることが確認されました。 https://t.co/LkfzvycOtU https://a-zs.net/apache_http_server_vulnerability/A_zs_Blog
2021-10-08 00:51:27Apache HTTP Server CVE-2021-41773の脆弱性への修正が不完全だったため、2.4.51で再度修正が行われ、CVE-2021-42013として公開されています。 リモートコード実行に繋がる恐れもあります… https://t.co/2lcEjvrkr9 https://twitter.com/i/web/status/1446274748967649280yamory_sec
2021-10-08 00:10:50New vulnerability that allows Remote Code Execution (CVE-2021-41773, CVE-2021-42013) in Apache HTTP Server 2.4.49 a… https://t.co/nBlV6HptRe https://twitter.com/i/web/status/1446265127012012034RkoAurelio
2021-10-07 23:30:37Since there is already exploit in Nuclei for #CVE-2021-42013, we share with you our payloads: 1. %%32%65%%32%65 2.… https://t.co/CvJhpG2LEW https://twitter.com/i/web/status/1446254140267630594itsecurityco
2021-10-07 23:20:52Meet CVE-2021-42013 on Apache 2.4.50 update to 2.4.51 :) https://t.co/MALQzXzyODRandomDhiraj
2021-10-07 23:20:44Same day service! #NodeZero now detects, exploits, and proves the latest #Apache HTTP Server vuln (CVE-2021-42013)… https://t.co/GzFsJcDcLw https://twitter.com/i/web/status/1446251867105865730Horizon3ai
2021-10-07 23:20:33RCE exploit both for Apache 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013): root@CT406:~# curl 'http://192.168… https://t.co/QwzEfT9xgj https://twitter.com/i/web/status/1446252280597078024roman_soft
2021-10-07 23:11:08Apache HTTP Server vulnerability (CVE-2021-42013) due to inadequacy fix for (CVE-2021-41773) - allows remote unauth… https://t.co/rL66mK7E6p https://twitter.com/i/web/status/1446249478768500742vulnhero
2021-10-07 23:10:04CVE-2021-42013 - This is how you can get an interactive shell via Metasploit (cmd/unix/reverse_bash payload exampl… https://t.co/G57qIA7XDP https://twitter.com/i/web/status/1446251278397476869astr0baby
2021-10-07 23:00:52Same day service! #NodeZero now detects, exploits, and proves the latest #Apache HTTP Server vuln (CVE-2021-42013)… https://t.co/5pHqALbfkQ https://twitter.com/i/web/status/1446246942250573829Horizon3ai
2021-10-07 22:40:03Want a good training exercise? Exploit #CVE-2021-42013! 1. Build a container with 2.4.49 FROM httpd:2.4.49 COPY .… https://t.co/cSGFOonizy https://twitter.com/i/web/status/1446243882392383504snyff
2021-10-07 22:30:03CVE-2021-42013 - Apache 2.4.49/2.4.50 - Path Traversal by nvn1729 "It was found that the fix for CVE-2021-41773 in… https://t.co/zw9JQaDl55 https://twitter.com/i/web/status/1446241353399037985pdnuclei
2021-10-07 21:10:15修正が不十分の為2.4.51がリリース Apache HTTP Serverの脆弱性情報(Critical: CVE-2021-42013, Important: CVE-2021-41773, Moderate: CVE-20… https://t.co/2zPk2B9pcx https://twitter.com/i/web/status/1446220323402104843omokazuki
2021-10-07 20:40:10I declare CVE-2021-42013 to be named Exacting Xerus https://t.co/cxLEMWlI44 https://nvd.nist.gov/vuln/detail/CVE-2021-42013vulnonym
2021-10-07 20:20:27🚨 Active scanning of Apache HTTP Server CVE-2021-41773 & CVE-2021-42013 is ongoing and expected to accelerate, like… https://t.co/iSqw7BTa0y https://twitter.com/i/web/status/1446208533356236805USCERT_gov
2021-10-07 19:20:14CVE-2021-42013 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An atta… https://t.co/sX7ppWJQCl https://twitter.com/i/web/status/1446192404923572226VulmonFeeds
2021-10-07 18:30:13CVE-2021-42013 - incomplete fix of CVE-2021-41773. https://t.co/rQxttqD1WLmkviitanen
2021-10-07 17:50:35#Apache Software Foundation addresses CVE-2021-41773 and CVE-2021-42013 in patch in response to zero-day #vulnerability.InakMali
2021-10-07 17:40:09Another patch out for CVE-2021-41773 (bypass assigned CVE-2021-42013), be sure you've updated to Apache httpd Serve… https://t.co/sPqUbbkgba https://twitter.com/i/web/status/1446166167849156610ClaireTills
2021-10-07 17:20:26See Apache's new update, which addresses both CVE-2021-41773 and CVE-2021-42013 (the latter is new):… https://t.co/WdHGrgoF02 https://twitter.com/i/web/status/1446162615433039872USCERT_gov
2021-10-07 17:20:20Important that those running @apache_httpd 2.4.49 or 2.4.50 updates to 2.4.51 to address CVE-2021-42013. Earlier v… https://t.co/suCXiHDdXU https://twitter.com/i/web/status/1446162976734593027notroj
2021-10-07 16:11:00CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of… https://t.co/00s4B2vUzD https://twitter.com/i/web/status/1446143437711892480oss_security
2021-10-07 16:00:15CVE-2021-42013 : It was found that the fix for CVE-2021-41773 in #Apache HTTP Server 2.4.50 was insufficient. An at… https://t.co/nWsTpyIb1i https://twitter.com/i/web/status/1446141671029321732CVEreport
2021-10-07 16:00:08@hanno @certbund Es gibt schon CVE-2021-42013 - weil der Fix für 41773 wohl incomplete war.eingemaischt
2021-10-07 15:30:09Apache 2.4.49 and 2.4.50 critical file disclosure/RCE for certain configurations: CVE-2021-42013 https://t.co/sGu13ffBLk https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb%40%3Cusers.httpd.apache.org%3Eiamamoose