First published: Tue Oct 05 2021(Updated: )
Apache HTTP Server contains a path traversal vulnerability that allows an attacker to perform remote code execution if files outside directories configured by Alias-like directives are not under default �require all denied� or if CGI scripts are enabled. The original patch issued under this CVE ID is insufficient, please review remediation information under CVE-2021-42013.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP Server | =2.4.49 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
oracle instantis enterprisetrack | =17.1 | |
oracle instantis enterprisetrack | =17.2 | |
oracle instantis enterprisetrack | =17.3 | |
netapp cloud backup | ||
Apache Http Server | ||
PHPUnit unit testing framework | ||
Laravel web application framework | ||
Apache Http Server | =2.4.49 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41773
Apache HTTP Server Path Traversal Vulnerability
The severity of CVE-2021-41773 is marked as high with a severity value of 7.5.
CVE-2021-41773 affects Apache HTTP Server version 2.4.49.
To fix the Apache HTTP Server Path Traversal Vulnerability, update Apache HTTP Server to version 2.4.50 or higher.