CVE STALKER

CVE-2021-42013

CVSS
DESCRIPTIONIt was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.
HEAT SCORE1897

WORDS

TWEETS

DATE TWEETS USER
2021-10-16 22:50:05🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/1KWZfIfwXE https://twitter.com/i/web/status/1449507830655029251threatintelctr
2021-10-16 21:50:03Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013 Published: 2021-10-16 Last Updated: 2021-10-16 17:13:51… https://t.co/IInnlU1AGE https://twitter.com/i/web/status/1449492762827575299test2v
2021-10-16 19:10:05New post from https://t.co/uXvPWJy6tj (Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013, (Sat, Oct 16th)… https://t.co/aFdzf0wxlk http://www.sesin.at https://twitter.com/i/web/status/1449451386278711301WolfgangSesin
2021-10-16 19:10:04New post from https://t.co/9KYxtdZjkl (Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013, (Sat, Oct 16th)… https://t.co/WaZ55jaAoe http://www.sesin.at https://twitter.com/i/web/status/1449451396198281216www_sesin_at
2021-10-16 18:20:08Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013, (Sat, Oct 16th) https://t.co/KZh8jPadyd #PoseidonTPA #SANS #Cybersecurity http://news.poseidon-us.com/S9jGddPoseidonTPA
2021-10-16 18:20:06Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013, (Sat, Oct 16th) https://t.co/UmbwNGd9nr https://poseidon-us.com/2021/10/16/apache-is-actively-scan-for-cve-2021-41773-cve-2021-42013-sat-oct-16th/PoseidonTPA
2021-10-16 18:10:07Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013, (Sat, Oct 16th) https://t.co/HIZ7y5tv05 #CyberSecurity https://t.co/YiAOoIfNoa http://twib.in/l/48y79pXpjno7aglongo
2021-10-16 17:20:12Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013 https://t.co/Qy0jEBaFXk https://t.co/Ty5Juj6EK9 https://i5c.us/d27940sans_isc
2021-10-16 17:20:06ISC Diary - Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013 #apache #cve-2021-41773 #cve-2021-42013… https://t.co/Fpv0OBWMZk https://twitter.com/i/web/status/1449424822287622146GuyBruneau
2021-10-16 16:30:06Apache HTTP Server 2.4.50 [CVE-2021-42013] Path Transversal and if CGI scripts are enabled for these aliased paths,… https://t.co/4krlmijO4P https://twitter.com/i/web/status/14494104707801047041337in
2021-10-16 14:50:07🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/JlCGMZWmde https://twitter.com/i/web/status/1449387033835704323threatintelctr
2021-10-16 14:00:04Critical CVE reported: CVE-2021-42013 #Apache Desc: An attacker could use a path traversal attack to map URLs to f… https://t.co/xzQ4In2Hqv https://twitter.com/i/web/status/1449374571950485508pottrsec
2021-10-16 10:50:04🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/UI0WokpuG0 https://twitter.com/i/web/status/1449326639452676100threatintelctr
2021-10-16 09:00:06見: Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/XiGtHxrWHk https://piyolog.hatenadiary.jp/entry/2021/10/10/031834hiro_y
2021-10-16 08:50:04パストラバーサルとRCE(リモートコード実行 )の脆弱性の件。 / “Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” https://t.co/4emizXFvd4 https://htn.to/2ikeVs9UCf__gfx__
2021-10-16 08:00:12🔴APACHE🔴 Múltiples vulnerabilidades de severidad alta en productos APACHE: CVE-2021-42013,CVE-2021-37608,CVE-2021… https://t.co/OQ7t1671EX https://twitter.com/i/web/status/1449283056896970752GrupoICA_Ciber
2021-10-16 07:30:35Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/5WaniruxDs https://twitter.com/i/web/status/1449274420506230786oss_security
2021-10-16 02:10:03アクセスログ見るとわかるけど本当にガンガンきてる。 / “Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” https://t.co/A1F1kKCFLO https://htn.to/wkUbVWoiyEmatsuu
2021-10-15 22:20:03🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/whp5IsQbQ1 https://twitter.com/i/web/status/1449137893574942725threatintelctr
2021-10-15 19:40:09New post from https://t.co/uXvPWJy6tj (CVE-2021-42013 (fedora, http_server)) has been published on https://t.co/aMFANuAUJt http://www.sesin.at https://www.sesin.at/2021/10/15/cve-2021-42013-fedora-http_server/WolfgangSesin
2021-10-15 19:40:06New post from https://t.co/9KYxtdZjkl (CVE-2021-42013 (fedora, http_server)) has been published on https://t.co/6PHd3kSr2y http://www.sesin.at https://www.sesin.at/2021/10/15/cve-2021-42013-fedora-http_server/www_sesin_at
2021-10-15 19:20:06Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/9mEbg52vCu https://twitter.com/i/web/status/1449091213504618498oss_security
2021-10-15 18:30:11Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/DUFiD5Cgrt https://wizsafe.iij.ad.jp/2021/10/1285/U_D_D_T
2021-10-15 16:50:18🚨 NEW: CVE-2021-42013 🚨 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient.… https://t.co/WbxWcZCm9n https://twitter.com/i/web/status/1449054844644384771threatintelctr
2021-10-15 06:20:06While everyone had a look at CVE-2021-41773 and CVE-2021-42013, this here is as good (at least for cloud environmen… https://t.co/Ij2I5hjJzu https://twitter.com/i/web/status/1448895383799844865h0ng10
2021-10-15 01:30:05@wugeej Only scanning for CVE-2021-42013 from that IP – no scanning activity for CVE-2021-41773 or any other CVE.bad_packets
2021-10-14 19:30:09Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/lYiIq36Z70 https://piyolog.hatenadiary.jp/entry/2021/10/10/031834HyoYoshikawa
2021-10-14 15:20:26φ(..) 【検証】Apacheのパストラバーサルの脆弱性 (CVE-2021-41773、CVE-2021-42013)を悪用する攻撃通信https://t.co/2ii3STwEzA https://www.nri-secure.co.jp/blog/apache-http-server-vulnerabilitystuons
2021-10-14 07:10:44#Apache CVE-2021-42013 みたいなものも来てた。 送信元:185.180.143.136 / AS 211680 ( Sistemas Informaticos, S.A. )… https://t.co/2AuQRcJ6Rw https://twitter.com/i/web/status/1448545215606788096KanbeWorks
2021-10-14 05:30:12[Apache] HTTP Server cgi-bin Path Traversal and RCE (CVE-2021-42013) This exploit can bypass for Apache HTTP Serve… https://t.co/3IwsudxuF5 https://twitter.com/i/web/status/1448519884808146944wugeej
2021-10-13 18:30:06CVE-2021-42013 & CVE-2021-41773 are being actively exploited in the wild: https://t.co/b9pjLi11yx https://downloads.apache.org/httpd/CHANGES_2.4.51HacKurx
2021-10-13 14:40:06“Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” https://t.co/TM4gaZXZxp https://htn.to/2w18Sj1jabkwdnet
2021-10-13 08:40:42SIOSセキュリティブログを更新しました。 Apache HTTP Serverの脆弱性情報(CVE-2021-41773, CVE-2021-42013)とPoC #sios_tech #security… https://t.co/VO4Zpk5e4R https://twitter.com/i/web/status/1448205539545010179omokazuki
2021-10-12 18:52:49amazn2-coreのapacheバージョンは2.4.48みたいなので、CVE-2021-41773、CVE-2021-42013の脆弱性の影響は受けずに済みそう。84kure
2021-10-12 13:43:41“Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見” https://t.co/UAy1ScwiSX https://htn.to/4s9RoHkFJ9zu2
2021-10-12 12:30:26【検証】Apacheのパストラバーサルの脆弱性 (CVE-2021-41773、CVE-2021-42013)を悪用する攻撃通信 - https://t.co/ABxZ5s6EGR https://www.nri-secure.co.jp/blog/apache-http-server-vulnerabilityka0com
2021-10-12 11:20:17【検証】Apacheのパストラバーサルの脆弱性 (CVE-2021-41773、CVE-2021-42013)を悪用する攻撃通信 https://t.co/47UGnBX3Ya https://www.nri-secure.co.jp/blog/apache-http-server-vulnerabilityamannk
2021-10-12 10:20:54Apache HTTP Serverにパストラバーサルが可能な脆弱性(CVE-2021-41773、CVE-2021-42013)が公開されました。当社SOCでもこの脆弱性を悪用する通信を多数検知しています。本脆弱性の検証結果、お… https://t.co/aMYjQkuXgb https://twitter.com/i/web/status/1447868334343483397NRIST
2021-10-12 02:30:39#セキュリティのアレ で取り上げられていたからやっとこさApacheの脆弱性(CVE-2021-41773, CVE-2021-42013)を確認した。参照できるだけじゃなくてRCEもあるのか…nishim
2021-10-12 00:40:48New post from https://t.co/9KYxtdZjkl (CVE-2021-42013) has been published on https://t.co/Q3Q2NqMUMX http://www.sesin.at https://www.sesin.at/2021/10/12/cve-2021-42013/www_sesin_at
2021-10-12 00:40:47New post from https://t.co/uXvPWJy6tj (CVE-2021-42013) has been published on https://t.co/1ReCzhPXaY http://www.sesin.at https://www.sesin.at/2021/10/12/cve-2021-42013/WolfgangSesin
2021-10-11 20:17:58UPDATE NOW: CVE-2021-42013 Vulnerability in Apache httpd Allows Access Outside the Site Root Directory https://t.co/VruANk2ogA #Linux https://www.linuxtoday.com/developer/update-now-cve-2021-42013-vulnerability-in-apache-httpd-allows-access-outside-the-site-root-directory/linuxtoday
2021-10-11 19:14:52Apache HTTP Server Path Normalization and Remote Code Execution (RCE) Vulnerability (CVE-2021-42013)… https://t.co/14eER3x50y https://twitter.com/i/web/status/1447638166878494729qualys
2021-10-11 13:30:08ZDA pack + Canvas in action: videos for Apache 2.4.49 RCE CVE-2021-41773, 2.4.50 RCE CVE-2021-42013 : https://t.co/f6DF5QAXpu https://vimeo.com/user7532837/videosGlegExploitPack
2021-10-11 13:00:16Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/neFEtwN8uv https://twitter.com/i/web/status/1447545153657315332oss_security
2021-10-11 10:33:14Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/lsfNMtOOm9 https://piyolog.hatenadiary.jp/entry/2021/10/10/031834ksk_bfb
2021-10-11 10:30:10CVE-2021-41773, CVE-2021-42013 "Apache/2.4.50" country:"JP" 361件 "Apache/2.4.51" country:"JP" 316件 対策したサーバ、増えたな。 ※… https://t.co/3fkaXuLVRk https://twitter.com/i/web/status/1447509600224169984hands_of_cat
2021-10-11 10:10:03Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/0ztUKSvt9c https://wizsafe.iij.ad.jp/2021/10/1285/ueyasu
2021-10-11 09:00:11Apache 2.4.49/2.4.50 postmortem CVE-2021-41773 and CVE-2021-42013 https://t.co/tXy4Yu9Pbw https://github.com/icing/blog/blob/main/httpd-2.4.50.mdiamamoose
2021-10-11 08:40:05GitHub - andrea-mattioli/apache-exploit-CVE-2021-42013: Exploit with integrated shodan search https://t.co/zYSPWjemYa https://github.com/andrea-mattioli/apache-exploit-CVE-2021-42013Securityblog
2021-10-11 06:50:05Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/ilNBiwSIEy https://piyolog.hatenadiary.jp/entry/2021/10/10/031834Pyo0072
2021-10-11 05:30:06Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた – piyolog https://t.co/Iumziy44sT https://piyolog.hatenadiary.jp/entry/2021/10/10/031834seo_jp_news
2021-10-11 04:30:07ふむふむ。。。 RT: Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/ecyikhrMyv https://piyolog.hatenadiary.jp/entry/2021/10/10/031834tsaka1
2021-10-11 02:30:06Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/BZ2L5NnuyE https://piyolog.hatenadiary.jp/entry/2021/10/10/031834taku888infinity
2021-10-11 01:50:08Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/3d5105ermZ https://piyolog.hatenadiary.jp/entry/2021/10/10/031834giw_news
2021-10-11 01:00:05夜行性インコさんのまとめ。先日から騒ぎになっているApacheの脆弱性について。PoCへのリンクもあり:Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめて… https://t.co/HHqHqniZAk https://twitter.com/i/web/status/1447366059560816642tamosan
2021-10-11 00:30:06Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/MvgnCkkb2D https://piyolog.hatenadiary.jp/entry/2021/10/10/031834oha000
2021-10-11 00:20:09Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/XwyBz8E4la https://piyolog.hatenadiary.jp/entry/2021/10/10/031834kit1t
2021-10-10 23:50:34Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた https://t.co/za9ENIO2mE https://piyolog.hatenadiary.jp/entry/2021/10/10/031834kaakaa_hoe_prog
2021-10-10 23:10:26他のスコアが高い脆弱性は、このサイトぐらい詳しく情報を提供してほしいなって常々思う。 特に攻撃方法とか。 Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめ… https://t.co/hBXemHqFlt https://twitter.com/i/web/status/1447337838928818182yk_style2011
2021-10-10 22:30:33Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた https://t.co/xUyjLuk39r https://piyolog.hatenadiary.jp/entry/2021/10/10/031834yosilove
2021-10-10 22:00:35Path Traversal Zero-Day en Apache HTTP Server | CVE-2021-41773|CVE-2021-42013 https://t.co/zcNVxxtTqI #cve… https://t.co/1q2wCy40Ou https://www.creadpag.com/2021/10/path-traversal-zero-day-en-apache-http.html https://twitter.com/i/web/status/1447319541575557121creadpag
2021-10-10 20:50:301件のコメント https://t.co/jRPX9n0Hnu “Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” (42 u… https://t.co/GzOxOgQ7Vz https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2021%2F10%2F10%2F031834&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20apache https://twitter.com/i/web/status/1447302371730595938tukaelu
2021-10-10 16:20:061件のコメント https://t.co/dPS68MdXoo “Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” (39 u… https://t.co/YGbpVa2l93 https://b.hatena.ne.jp/entry?url=https%3A%2F%2Fpiyolog.hatenadiary.jp%2Fentry%2F2021%2F10%2F10%2F031834&utm_campaign=bookmark_share&utm_content=piyolog.hatenadiary.jp&utm_medium=social&utm_source=twitter&utm_term=%E3%83%86%E3%82%AF%E3%83%8E%E3%83%AD%E3%82%B8%E3%83%BC%20apache https://twitter.com/i/web/status/1447235136974573577RyoTa63292153
2021-10-10 15:00:24はいきた! 私の仕事が増えるやーつ💢 #お仕事の話 Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた https://t.co/7CE2x4FNl7 https://piyolog.hatenadiary.jp/entry/2021/10/10/031834sakuranbon50
2021-10-10 14:50:28Apache server version 2.4.51 (CVE-2021-42013) https://t.co/fjeJGWJIP9TheXXLMAN
2021-10-10 13:30:06Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/KBrMUkEGWk https://ift.tt/30cUovanerubesa
2021-10-10 13:10:22Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた https://t.co/XVGbcNaHSr https://t.co/Kpd0i2x2hR https://piyolog.hatenadiary.jp/entry/2021/10/10/031834 https://b.hatena.ne.jp/entry/s/piyolog.hatenadiary.jp/entry/2021/10/10/031834avalon1982
2021-10-10 13:10:12【更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773, CVE-2021-42013)】 ・バージョン 2.4.50 にて、修正が不十分であることが公表(CVE-2021-42013)さ… https://t.co/dKOzpXLFlm https://twitter.com/i/web/status/1447186444133433347HAL_CSIRT
2021-10-10 10:20:44@NevenaSofranic Jesi li patch-ovala ove nove propuste? CVE-2021-42013 😂 Sada znaš iz iskustva iz sna (snilog iskus… https://t.co/lQFuaMbZPx https://twitter.com/i/web/status/1447143906718720005bashgrylls
2021-10-10 10:00:35まとめ助かる / “Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” https://t.co/BuftPZRDpG https://htn.to/3xvZKCt31at_motooka
2021-10-10 09:10:11Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/6EXLoW7N6d https://piyolog.hatenadiary.jp/entry/2021/10/10/031834nmatayoshi
2021-10-10 07:51:04🚨 Active scanning of Apache HTTP Server CVE-2021-41773 & CVE-2021-42013 is ongoing and expected to accelerate, like… https://t.co/qTQV7q8gxF https://twitter.com/i/web/status/1447106846293172225hernanespinoza
2021-10-10 07:03:20Apache httpd の脆弱性に注意(CVE-2021-42013): Apache httpd 2.4.50 のリリースから数日しか経っていませんが、2.4.51 がリリース... https://t.co/w1ucfz4TtC https://blog.cles.jp/item/12768?utm_source=rss?utm_source=SocialDoghsur
2021-10-10 06:51:59“Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” https://t.co/GUL8qFLAky https://htn.to/3rKd8dWkqzmodokey
2021-10-10 06:51:24“Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog” https://t.co/rLk7123jqK https://htn.to/21EFtXmzD7modokey
2021-10-10 06:40:33Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/dDIIHt3rFk https://piyolog.hatenadiary.jp/entry/2021/10/10/031834ohhara_shiojiri
2021-10-10 06:24:46Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/XiXwCgCC9V https://piyolog.hatenadiary.jp/entry/2021/10/10/031834shunta08101
2021-10-10 06:01:05Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/Z9C3SJXj2x https://piyolog.hatenadiary.jp/entry/2021/10/10/031834sutest1101
2021-10-10 05:41:12“Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” https://t.co/4DgP5275gp https://htn.to/3ym3Gcb2nomiraihack
2021-10-10 05:31:08“Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” https://t.co/KdX17kSf0W https://htn.to/2WxGdpp71Pequinox79
2021-10-10 05:30:40Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/NLjXOYgmF5 パス(ディレクトリ)トラバーサ… https://t.co/YATUrdvTdu https://piyolog.hatenadiary.jp/entry/2021/10/10/031834 https://twitter.com/i/web/status/1447071137934938117yomoyomo
2021-10-10 05:11:52Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/cHm5fBLrD8 https://piyolog.hatenadiary.jp/entry/2021/10/10/031834it_hatebu
2021-10-10 03:30:32Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog https://t.co/ljdXB47twJ https://eng-blog.iij.ad.jp/archives/10987aiujp1985
2021-10-10 03:00:45Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/FyP2ZIpuk4 https://ift.tt/30cUovamagiauk
2021-10-10 02:50:50Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - https://t.co/zylIMjWF3x https://piyolog.hatenadiary.jp/entry/2021/10/10/031834ka0com
2021-10-10 02:40:15Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/DoItKXiAye https://piyolog.hatenadiary.jp/entry/2021/10/10/031834ton960
2021-10-10 02:10:14New post: 【後で読みたい!】更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773, CVE-2021-42013) https://t.co/ir3uxUNdNA https://www.taksbar.link/?p=179868tak_mita
2021-10-10 01:30:21Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた https://t.co/QSe43BfISf https://piyolog.hatenadiary.jp/entry/2021/10/10/031834matsuu_zatsu
2021-10-10 01:00:11Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/aHjigmIFsj 数日前に話題になっていたやつだ。自分の検証環境で後で試してみる。 https://piyolog.hatenadiary.jp/entry/2021/10/10/031834lemonade_air
2021-10-10 00:10:19Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/YSG41RH71L https://piyolog.hatenadiary.jp/entry/2021/10/10/031834matiere
2021-10-09 23:30:19修正が不十分だから、CVE-2021-42013 が公開された。ただそれも不十分の模様。 Red Hat はそもそもの脆弱性の影響を受けないので、影響受けないんだろうな。 RHEL8 は、v2.4.37 をベースに Red H… https://t.co/S8VwJK1c0I https://twitter.com/i/web/status/1446980609692225537hands_of_cat
2021-10-09 23:00:12Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/sNGjV5YxF8 https://piyolog.hatenadiary.jp/entry/2021/10/10/031834tethys_seesaa
2021-10-09 18:50:24Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/2Eo3Ii4ft2 https://piyolog.hatenadiary.jp/entry/2021/10/10/031834muupapa
2021-10-09 18:50:11Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/3zkYvatXLD https://twitter.com/i/web/status/1446910469944459267oss_security
2021-10-09 18:20:04はてなブログに投稿しました #はてなブログ Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog https://t.co/zvnCDiZrDi https://piyolog.hatenadiary.jp/entry/2021/10/10/031834piyokango
2021-10-09 14:30:05オレもオレもCVE-2021-420130x009AD6_810
2021-10-09 12:30:12Dockerを使ってCVE-2021-42013を検証する - https://t.co/kcK3HoHMVR https://nekotosec.com/validate-cve-2021-42013-using-docker/?utm_source=rss&utm_medium=rss&utm_campaign=validate-cve-2021-42013-using-dockerka0com
2021-10-09 12:10:25New based #vulnerability identifier, CVE-2021-42013, it builds on CVE-2021-41773, which was a vulnerability in… https://t.co/wP4D53b3bu https://twitter.com/i/web/status/1446808784970600462Mawg0ud
2021-10-09 12:00:05@eng_bunawaf يوجد تحديثين مختلفة يمكنك الاطلاع ⤵️👍 CVE-2021-41773 https://t.co/HoTpRE9axW CVE-2021-42013 https://t.co/zIolLpZrgk https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41773 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42013hmoud1996
2021-10-09 09:20:10This many #Apache 2.4.49/2.4.50: 350,000+ #CVE-2021-41773 #CVE-2021-42013 https://t.co/hBHz6vBmUvonyphe
2021-10-09 07:31:402.4.50だめだったんか Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/hogllRpE2K https://wizsafe.iij.ad.jp/2021/10/1285/suzu_GBA2003
2021-10-09 05:22:29#أمن_المعلومات #برمجة Apache HTTP Server 2.4.49 and 50 - Path Traversal CVE-2021-41773 /.%2e CVE-2021-42013 /.%%3… https://t.co/ItPTaVVFJf https://twitter.com/i/web/status/1446706565642432512infosec_90
2021-10-09 05:01:29Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 - IIJ https://t.co/NqGaSoNCNt https://wizsafe.iij.ad.jp/2021/10/1285/kawn2020
2021-10-09 04:11:16NowBrowsing: "更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773, CVE-2021-42013):IPA 独立行政法人 情報処理推進機構" https://t.co/Ushiy2kObU https://www.ipa.go.jp/security/ciadr/vul/alert20211006.htmlyoshiteru
2021-10-09 03:32:55Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 - IIJ https://t.co/NqGaSoNCNt https://wizsafe.iij.ad.jp/2021/10/1285/kawn2020
2021-10-09 02:50:21CVE-2021-42013へのこの流れってウェブ路地でもやってたよな なんやねんshimau_
2021-10-09 01:24:35更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773, CVE-2021-42013) - 独立行政法人情報処理推進機構(IPA) https://t.co/jD1s3yoaUa https://www.ipa.go.jp/security/ciadr/vul/alert20211006.htmlkawn2020
2021-10-09 00:51:39Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/YF4D3edwYm https://twitter.com/i/web/status/1446638424882962433oss_security
2021-10-09 00:51:32Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/KTWJqUCYCd https://twitter.com/i/web/status/1446638430444605442oss_security
2021-10-09 00:51:04add. Apache 2.4.49 CVE-2021-41773 and Apache 2.4.50 CVE-2021-42013 – SCANNER/TRAVERSAL/RCE by mekhalleh · Pull Requ… https://t.co/WaA8JZcBUR https://twitter.com/i/web/status/1446638505837408265d34dr4bbit
2021-10-09 00:50:36Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog https://t.co/g9z5NRLEj5 https://eng-blog.iij.ad.jp/archives/10987stm_si
2021-10-09 00:41:10Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog https://t.co/xForDAZCqg https://eng-blog.iij.ad.jp/archives/10987kontonb
2021-10-08 23:30:32Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 https://t.co/skbjOdb108 https://ift.tt/3AndgUsnerubesa
2021-10-08 22:10:56“Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見” https://t.co/m1NvGlucoV https://htn.to/26MnBCmbwKteramako
2021-10-08 21:50:46Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/8CqHad9jQu https://twitter.com/i/web/status/1446593250865795073oss_security
2021-10-08 21:50:41Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/pbMAEEwJzW https://twitter.com/i/web/status/1446593256393900038oss_security
2021-10-08 21:50:37Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/m4b3zOJKfT https://twitter.com/i/web/status/1446593261930311683oss_security
2021-10-08 21:21:06Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 https://t.co/y9isMapo97 https://wizsafe.iij.ad.jp/2021/10/1285/it_hatebu
2021-10-08 21:21:01“Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog” https://t.co/IBZZ1KsFJ4 https://htn.to/4uQr8gVcJHtmhwq
2021-10-08 20:13:49CVE-2021-42013) apache 2.4.49. vs apache 2.4.50 #BugBounty #infosec https://t.co/zD3WOJzWIxr00t_nasser
2021-10-08 20:12:00Algunos Payloads para el CVE-2021-42013 de Apache 2.4.50 https://t.co/q759wPXYEL añádelo a tu Burpbounty Free o PRO https://t.co/zhSRCjWMuN https://t.me/dragonjar/10187 https://twitter.com/BurpBounty/status/1445702174193815552DragonJAR
2021-10-08 20:02:16The reason for the second fix to Apache server version 2.4.51 (CVE-2021-42013) https://t.co/3uAGZTzFnzcyb3rops
2021-10-08 19:53:06Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog https://t.co/nvQKmEGhl4 https://eng-blog.iij.ad.jp/archives/10987it_hatebu
2021-10-08 19:31:32CVE-2021-41773, CVE-2021-42013 https://t.co/UMjkLkPeM1 https://www.jpcert.or.jp/at/2021/at210043.htmlyumetov
2021-10-08 16:40:25RCE exploit both for Apache 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013). Have fun 😎 and secure your work en… https://t.co/awpd92Fc8L https://twitter.com/i/web/status/1446514818891096080osamah_Alshaya
2021-10-08 16:00:13Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog https://t.co/84zdCj0XOL https://ift.tt/3amGDvAmagiauk
2021-10-08 15:38:47Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/W0e6Alh5yo https://wizsafe.iij.ad.jp/2021/10/1285/miki158s
2021-10-08 14:30:29CVE-2021-42013は俺が見つけた的なこと世界のあちこちで言ってる人がいそうyousukezan
2021-10-08 14:11:42A short video demo of the CVE-2021-42013 Apache 2.4.50 POC https://t.co/7tWgHjILJf https://youtu.be/MFBUuJyWPkkastr0baby
2021-10-08 14:00:26🚨اذا كنت تستخدم Apache HTTP Server قم بتحديثه واغلاق الثغرات CVE-2021-41773 & CVE-2021-42013. حيث يقوم المهاجمين ب… https://t.co/QZwNvuJrp0 https://twitter.com/i/web/status/1446474781642141699MAlajab
2021-10-08 13:20:44“Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見” (16 users) https://t.co/FTtmTBOpEv https://htn.to/3MQnH6ATHgburnworks
2021-10-08 12:45:31めっちゃやり方書いてある!! Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- I… https://t.co/Ky9PgeftiX https://twitter.com/i/web/status/1446452834854080518kunio99
2021-10-08 12:41:55Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/BPVRo5lERF https://wizsafe.iij.ad.jp/2021/10/1285/LuciferAlpha
2021-10-08 12:31:35I just update the PoC to introduce the CVE-2021-42013 (Traversal/RCE into Apache 2.4.49/2.4.50) Support more check… https://t.co/KfAGaC4qyE https://twitter.com/i/web/status/1446452062020067328Mekhalleh
2021-10-08 11:50:18مهم ⚠️ 🚨 Active scanning of #Apache HTTP Server CVE-2021-41773 & CVE-2021-42013 is ongoing and expected to accelera… https://t.co/gSgjGNl83D https://twitter.com/i/web/status/1446442231750184987cybersec2030
2021-10-08 11:41:34Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/14SdiIZ2e6 https://wizsafe.iij.ad.jp/2021/10/1285/MASA89434701
2021-10-08 11:31:36Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ… https://t.co/oOlj62WZqF https://twitter.com/i/web/status/1446436421661646856takahoyo
2021-10-08 10:50:30Apache 2.4.50 (CVE-2021-42013) RCE playground https://t.co/oOnOZoVs5f #bugbountytips https://github.com/RedSection/poc/blob/main/cve-2021-41773evrnyalcin
2021-10-08 10:41:45“Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見” https://t.co/mTFNVCBGIy https://htn.to/3kHqhoGjUPwaiha8
2021-10-08 10:41:33Apache HTTP Zero-day CVE-2021-41773 fix Bypassed With CVE-2021-42013 https://t.co/O3qINzh9Q9 #Apache #security #bugbounty #zeroday https://www.cyberkendra.com/2021/10/apache-http-zero-day-cve-2021-41773-fix.htmlcyberkendra
2021-10-08 10:23:26@CFCSsitcen Den nye RCE er CVE-2021-42013 (incomplete fix af CVE-2021-41773) https://t.co/6A774lFEMS - værd at nævne. https://seclists.org/oss-sec/2021/q4/17emilstahl
2021-10-08 10:01:49Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fi… https://t.co/QMjtPYawSF https://twitter.com/i/web/status/1446413819308232711oss_security
2021-10-08 09:51:31_φ(・_・ Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 https://t.co/AJWGQfJRO0 https://wizsafe.iij.ad.jp/2021/10/1285/kabukawa
2021-10-08 08:51:14Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog https://t.co/3mZew29wht https://eng-blog.iij.ad.jp/archives/10987nekochanSec555
2021-10-08 08:31:22PoC(CVE-2021-42013)と動画を追加 Apache HTTP Serverの脆弱性情報(Critical: CVE-2021-42013, Important: CVE-2021-41773, Moderate:… https://t.co/Bh604HuZqc https://twitter.com/i/web/status/1446391259363307526omokazuki
2021-10-08 08:30:44PoC(CVE-2021-42013)動画をアップしました。 #sios_tech #security #vulnerability #セキュリティ #脆弱性 #apache #httpd #web https://t.co/V9tyGgimYZ https://www.youtube.com/watch?v=PqlAj6R54-womokazuki
2021-10-08 08:11:45Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 - https://t.co/nH9r4pyeVg https://wizsafe.iij.ad.jp/2021/10/1285/ka0com
2021-10-08 08:11:34Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター | IIJ Engineers Blog - https://t.co/b8HEomqnJ1 https://eng-blog.iij.ad.jp/archives/10987ka0com
2021-10-08 08:00:49Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 https://t.co/lKiM845XPA https://ift.tt/3AndgUsmagiauk
2021-10-08 07:51:50Patch your apache! CVE-2021-42013 https://t.co/nyxakqmzz0vx_herm1t
2021-10-08 07:51:36@Ax_Sharma @hackerfantastic @wdormann Looks like it's been confirmed with latest advisory (CVE-2021-42013):… https://t.co/4rk4zHNuRQ https://twitter.com/i/web/status/1446379892225028127timb_machine
2021-10-08 07:33:08『WAF「Scutum」では、CVE-2021-42013の脆弱性についても、既存の防御機能により本脆弱性公開前から攻撃を防御できていることを確認しております。』 https://t.co/RfFif8x7tX https://www.scutum.jp/information/technical_articles/index.htmlkinyuka
2021-10-08 07:31:52Apacheのど派手な脆弱性2連発(CVE-2021-41773,CVE-2021-42013)でしたが、幸いScutumではどちらもゼロデイ防御可能なものでした。2つめはけっこう止められなかったWAFもあるんじゃないかな? https://t.co/QCdqpfwoIL https://twitter.com/kinyuka/status/1446376229947408386kinyuka
2021-10-08 07:22:13Hey let's fix CVE-2021-41773 Apache HTTP Server 2.4.49 Fix path traversal... NOT... and get CVE-2021-42013 up to 2… https://t.co/VcV0ktO0c6 https://twitter.com/i/web/status/1446373888213069853_superhero1
2021-10-08 07:21:55更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773, CVE-2021-42013):IPA 独立行政法人 情報処理推進機構 https://t.co/OzoEVvwRkm https://www.ipa.go.jp/security/ciadr/vul/alert20211006.htmlohhara_shiojiri
2021-10-08 07:21:39「バージョン 2.4.50 にて、修正が不十分であることが公表(CVE-2021-42013)され、こちらを修正したバージョン 2.4.51 がリリースされました。」ohhara_shiojiri
2021-10-08 07:20:17@stanner_austin @chybeta The PoC of CVE-2021-42013 has been published in Twitter... You can search it.m01e_exp
2021-10-08 07:06:58Exploiting #RCE exploit for #Apache 2.4.49 (#CVE-2021-41773) and 2.4.50 (CVE-2021-42013) in windows machine.… https://t.co/VGRx1bVyie https://twitter.com/i/web/status/1446367576158842881gweeperx
2021-10-08 07:04:41#Apache has released Apache #HTTP Server 2.4.51 to address vulnerabilities (CVE-2021-41773, CVE-2021-42013) in Apac… https://t.co/kGQPGH7xqC https://twitter.com/i/web/status/1446367830442717221nerccu
2021-10-08 06:55:19Vulnerabilidad en Apache (2.4.49) que permitiría a un atacante exfiltrar información. CVE-2021-42013 https://t.co/wADFThfi31 http://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-41773RaulRenales
2021-10-08 06:54:04“更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773, CVE-2021-42013):IPA 独立行政法人 情報処理推進機構” (1 user) https://t.co/ed3LDI1ATA https://htn.to/4967on9TX2RyoTa63292153
2021-10-08 06:51:32RCE exploit both for Apache 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013): curl 'https://t.co/ZW4ay1YXtA' --d… https://t.co/bKMOoY3OcE http://host.com/cgi-bin/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/bin/sh https://twitter.com/i/web/status/14463664777711779850xhunster
2021-10-08 06:51:01ご報告 CVE-2021-42013の発見者1人として名を残しました。お溢れみたいな発見でしたが、自身の中で目標としていた“2年以内にCVE発見に関わる”をクリアできました。 自身の所属会社での記事を宣伝します。 記事内に、少し… https://t.co/jLl7s4t5Li https://twitter.com/i/web/status/1446366551704158222hinoshiba
2021-10-08 06:40:55Apache HTTP Server 2.4.50の脆弱性"CVE-2021-42013"の発見は、IIJ SOC(セキュリティオペレーションセンター)の業務の一環として行われました。IIJ SOCの脆弱性調査の模様を、別記事にて… https://t.co/Z4WrlkmcR7 https://twitter.com/i/web/status/1446364677861097473IIJ_doumae
2021-10-08 06:35:09「Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター」 IIJ SOCのアナリスト熊坂駿吾が報告したCVE-2021-42013の紹介と、本報告に関係するS… https://t.co/kTD0HCqdfO https://twitter.com/i/web/status/1446360005070909442IIJ_ITS
2021-10-08 06:34:33Patch for CVE-2021-41773 introduces RCE. Patch now for CVE-2021-42013. A patchy server indeed.tongson
2021-10-08 06:34:23「IIJ Engineers Blog」に「Apache httpdの脆弱性“CVE-2021-42013”の発見と報告 – IIJ セキュリティオペレーションセンター」を掲載しました。 ぜひご覧ください。… https://t.co/nVqq9mCU45 https://twitter.com/i/web/status/1446360335821066241IIJ_PR
2021-10-08 06:20:32#セキュリティ 情報発信サイト「wizSafe Security Signal」に「Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見」を掲載しました。 IIJ… https://t.co/oVyQ7SBG0j https://twitter.com/i/web/status/1446359351732498439IIJ_PR
2021-10-08 06:03:58See the patch on the patch again:incomplete fix of CVE-2021-41773 --> CVE-2021-42013 https://t.co/DXriwrnvay So Apache 2.4.50 also fell https://httpd.apache.org/security/vulnerabilities_24.html80vul
2021-10-08 06:03:51Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ… https://t.co/pWp952FgRC https://twitter.com/i/web/status/1446352571996672008nekochanSec555
2021-10-08 06:03:42Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/jHTqqePU9J https://wizsafe.iij.ad.jp/2021/10/1285/piyokango
2021-10-08 05:53:18CVE-2021-42013 & CVE-2021-41773 Apache HTTPd  Path Traversal and Remote Code Execution #Apache #vulnerability https://t.co/v7eurGOex00xhunster
2021-10-08 05:50:56Reproduce CVE-2021-42013 Apache 2.4.50 path traversal vulnerability. Path traversal vulnerability GET /cgi-bin/%%… https://t.co/ypIraUaaYP https://twitter.com/i/web/status/1446351656568852483RapidSafeguard
2021-10-08 05:50:09Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/zL8hNW3Icf https://wizsafe.iij.ad.jp/2021/10/1285/ohhara_shiojiri
2021-10-08 05:30:08脆弱性の修正が不十分だった今回の問題は、IIJ の SOC メンバーが(も)発見し報告しました。GJ! Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 –… https://t.co/CjE0rOPDbB https://twitter.com/i/web/status/1446347069556355072MasafumiNegishi
2021-10-08 05:11:10Apache HTTP Server 2.4.50におけるパストラバーサル脆弱性(CVE-2021-42013)の発見 – wizSafe Security Signal -安心・安全への道標- IIJ https://t.co/WrJu0Y0Sel https://wizsafe.iij.ad.jp/2021/10/1285/oubon21120991
2021-10-08 05:10:54「本脆弱性の修正として提供したバージョン2.4.50に、別のパストラバーサルの脆弱性(CVE-2021-42013)があることが判明したことを発表し、本脆弱性を修正するバージョン2.4.51をリリース」 Apache HTTP… https://t.co/JxLfZ1D5Gd https://twitter.com/i/web/status/1446340555324018689nilab
2021-10-08 04:24:40Apache HTTP Server 2.4.50 の「別のパストラバーサル」の脆弱性( CVE-2021-42013 )、%%32%45 や %%32%65 や %2%45 や %2%65 や %%32e や %%32E といっ… https://t.co/3TLM2PfNME https://twitter.com/i/web/status/1446327543951286275ymzkei5
2021-10-08 04:13:45Additional fixes to Apache HTTP Server for CVE-2021-41773, which is tracked as CVE-2021-42013 Bulletin:… https://t.co/AQSAIZwncj https://twitter.com/i/web/status/1446326504866992131AusCERT
2021-10-08 04:05:16CVE-2021-42013 & CVE-2021-41773 Apache HTTPd  Path Traversal and Remote Code Execution https://t.co/kKhaIBSzppchybeta
2021-10-08 03:57:44わずか3日、「Apache HTTPD」が再修正 - 前回修正は不十分、あらたにRCEのおそれも:Security NEXT https://t.co/jqpwozpckt “CVE番号「CVE-2021-42013」があらたに… https://t.co/pA3KxuP8mh https://www.security-next.com/130520 https://twitter.com/i/web/status/1446319751664312322catnap707
2021-10-08 03:44:31「vulnerabilities (CVE-2021-41773, CVE-2021-42013) in Apache HTTP Server 2.4.49 and 2.4.50」→Apache Releases HTTP Ser… https://t.co/gOsH1m1B3G https://twitter.com/i/web/status/1446317057830580229k1rou
2021-10-08 03:43:39RCE exploit both for Apache 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013): POC... We got a Reverse Shell! https://t.co/rakLyIz62v https://youtu.be/WSVcuV2Wc58CCNADailyTIPS
2021-10-08 03:11:38Apache HTTPD 2.4.51がリリースされました。パストラバーサル及びリモートからのコード実行の脆弱性(CVE-2021-42013)が修正されています。 「インストールするもの」を更新しました。 https://t.co/FeWMd4NuAK https://http2.try-and-test.net/install.html#apacheken1no
2021-10-08 02:52:30「更新: 2021年10月8日追記 本脆弱性の修正として提供したバージョン2.4.50に、別のパストラバーサルの脆弱性(CVE-2021-42013)があることが判明したことを発表し、本脆弱性を修正するバージョン2.4.51をリリースしました。」ohhara_shiojiri
2021-10-08 01:40:29“Vulnerabilities (CVE-2021-41773) & CVE-2021-42013) have been identified in Apache HTTP Server, one of the most com… https://t.co/aNcL1LKwkb https://twitter.com/i/web/status/1446288933680291840christinayiotis
2021-10-08 01:40:21【追記】 パストラバーサルおよびリモートコード実行の脆弱性(CVE-2021-42013):パストラバーサルの脆弱性の修正が不十分であることが確認されました。 https://t.co/LkfzvycOtU https://a-zs.net/apache_http_server_vulnerability/A_zs_Blog
2021-10-08 00:51:27Apache HTTP Server CVE-2021-41773の脆弱性への修正が不完全だったため、2.4.51で再度修正が行われ、CVE-2021-42013として公開されています。 リモートコード実行に繋がる恐れもあります… https://t.co/2lcEjvrkr9 https://twitter.com/i/web/status/1446274748967649280yamory_sec
2021-10-08 00:10:50New vulnerability that allows Remote Code Execution (CVE-2021-41773, CVE-2021-42013) in Apache HTTP Server 2.4.49 a… https://t.co/nBlV6HptRe https://twitter.com/i/web/status/1446265127012012034RkoAurelio
2021-10-07 23:30:37Since there is already exploit in Nuclei for #CVE-2021-42013, we share with you our payloads: 1. %%32%65%%32%65 2.… https://t.co/CvJhpG2LEW https://twitter.com/i/web/status/1446254140267630594itsecurityco
2021-10-07 23:20:52Meet CVE-2021-42013 on Apache 2.4.50 update to 2.4.51 :) https://t.co/MALQzXzyODRandomDhiraj
2021-10-07 23:20:44Same day service! #NodeZero now detects, exploits, and proves the latest #Apache HTTP Server vuln (CVE-2021-42013)… https://t.co/GzFsJcDcLw https://twitter.com/i/web/status/1446251867105865730Horizon3ai
2021-10-07 23:20:33RCE exploit both for Apache 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013): root@CT406:~# curl 'http://192.168… https://t.co/QwzEfT9xgj https://twitter.com/i/web/status/1446252280597078024roman_soft
2021-10-07 23:11:08Apache HTTP Server vulnerability (CVE-2021-42013) due to inadequacy fix for (CVE-2021-41773) - allows remote unauth… https://t.co/rL66mK7E6p https://twitter.com/i/web/status/1446249478768500742vulnhero
2021-10-07 23:10:04CVE-2021-42013 - This is how you can get an interactive shell via Metasploit (cmd/unix/reverse_bash payload exampl… https://t.co/G57qIA7XDP https://twitter.com/i/web/status/1446251278397476869astr0baby
2021-10-07 23:00:52Same day service! #NodeZero now detects, exploits, and proves the latest #Apache HTTP Server vuln (CVE-2021-42013)… https://t.co/5pHqALbfkQ https://twitter.com/i/web/status/1446246942250573829Horizon3ai
2021-10-07 22:40:03Want a good training exercise? Exploit #CVE-2021-42013! 1. Build a container with 2.4.49 FROM httpd:2.4.49 COPY .… https://t.co/cSGFOonizy https://twitter.com/i/web/status/1446243882392383504snyff
2021-10-07 22:30:03CVE-2021-42013 - Apache 2.4.49/2.4.50 - Path Traversal by nvn1729 "It was found that the fix for CVE-2021-41773 in… https://t.co/zw9JQaDl55 https://twitter.com/i/web/status/1446241353399037985pdnuclei
2021-10-07 21:10:15修正が不十分の為2.4.51がリリース Apache HTTP Serverの脆弱性情報(Critical: CVE-2021-42013, Important: CVE-2021-41773, Moderate: CVE-20… https://t.co/2zPk2B9pcx https://twitter.com/i/web/status/1446220323402104843omokazuki
2021-10-07 20:40:10I declare CVE-2021-42013 to be named Exacting Xerus https://t.co/cxLEMWlI44 https://nvd.nist.gov/vuln/detail/CVE-2021-42013vulnonym
2021-10-07 20:20:27🚨 Active scanning of Apache HTTP Server CVE-2021-41773 & CVE-2021-42013 is ongoing and expected to accelerate, like… https://t.co/iSqw7BTa0y https://twitter.com/i/web/status/1446208533356236805USCERT_gov
2021-10-07 19:20:14CVE-2021-42013 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An atta… https://t.co/sX7ppWJQCl https://twitter.com/i/web/status/1446192404923572226VulmonFeeds
2021-10-07 18:30:13CVE-2021-42013 - incomplete fix of CVE-2021-41773. https://t.co/rQxttqD1WLmkviitanen
2021-10-07 17:50:35#Apache Software Foundation addresses CVE-2021-41773 and CVE-2021-42013 in patch in response to zero-day #vulnerability.InakMali
2021-10-07 17:40:09Another patch out for CVE-2021-41773 (bypass assigned CVE-2021-42013), be sure you've updated to Apache httpd Serve… https://t.co/sPqUbbkgba https://twitter.com/i/web/status/1446166167849156610ClaireTills
2021-10-07 17:20:26See Apache's new update, which addresses both CVE-2021-41773 and CVE-2021-42013 (the latter is new):… https://t.co/WdHGrgoF02 https://twitter.com/i/web/status/1446162615433039872USCERT_gov
2021-10-07 17:20:20Important that those running @apache_httpd 2.4.49 or 2.4.50 updates to 2.4.51 to address CVE-2021-42013. Earlier v… https://t.co/suCXiHDdXU https://twitter.com/i/web/status/1446162976734593027notroj
2021-10-07 16:11:00CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of… https://t.co/00s4B2vUzD https://twitter.com/i/web/status/1446143437711892480oss_security
2021-10-07 16:00:15CVE-2021-42013 : It was found that the fix for CVE-2021-41773 in #Apache HTTP Server 2.4.50 was insufficient. An at… https://t.co/nWsTpyIb1i https://twitter.com/i/web/status/1446141671029321732CVEreport
2021-10-07 16:00:08@hanno @certbund Es gibt schon CVE-2021-42013 - weil der Fix für 41773 wohl incomplete war.eingemaischt
2021-10-07 15:30:09Apache 2.4.49 and 2.4.50 critical file disclosure/RCE for certain configurations: CVE-2021-42013 https://t.co/sGu13ffBLk https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb%40%3Cusers.httpd.apache.org%3Eiamamoose