First published: Tue Oct 05 2021(Updated: )
Apache HTTP Server contains a path traversal vulnerability that allows an attacker to perform remote code execution if files outside directories configured by Alias-like directives are not under default �require all denied� or if CGI scripts are enabled. The original patch issued under this CVE ID is insufficient, please review remediation information under CVE-2021-42013.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP server | =2.4.49 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Oracle Instantis Enterprisetrack | =17.1 | |
Oracle Instantis Enterprisetrack | =17.2 | |
Oracle Instantis Enterprisetrack | =17.3 | |
Netapp Cloud Backup | ||
PHPUnit unit testing framework | ||
Apache HTTP server | ||
Laravel web application framework | ||
=2.4.49 | ||
=34 | ||
=35 | ||
=17.1 | ||
=17.2 | ||
=17.3 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41773
Apache HTTP Server Path Traversal Vulnerability
The severity of CVE-2021-41773 is marked as high with a severity value of 7.5.
CVE-2021-41773 affects Apache HTTP Server version 2.4.49.
To fix the Apache HTTP Server Path Traversal Vulnerability, update Apache HTTP Server to version 2.4.50 or higher.