First published: Thu Oct 07 2021(Updated: )
Apache HTTP Server contains a path traversal vulnerability that allows an attacker to perform remote code execution if files outside directories configured by Alias-like directives are not under default require all denied or if CGI scripts are enabled. This CVE ID resolves an incomplete patch for CVE-2021-41773.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP server | =2.4.49 | |
Apache HTTP server | =2.4.50 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Oracle Instantis Enterprisetrack | =17.1 | |
Oracle Instantis Enterprisetrack | =17.2 | |
Oracle Instantis Enterprisetrack | =17.3 | |
Oracle Jd Edwards Enterpriseone Tools | <9.2.6.0 | |
Oracle Secure Backup | <18.1.0.1.0 | |
Netapp Cloud Backup | ||
Apache HTTP server | ||
=2.4.49 | ||
=2.4.50 | ||
=34 | ||
=35 | ||
=17.1 | ||
=17.2 | ||
=17.3 | ||
<9.2.6.0 | ||
<18.1.0.1.0 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-42013.
The title of the vulnerability is Apache HTTP Server Path Traversal Vulnerability.
The severity of CVE-2021-42013 is critical with a CVSS score of 9.8.
CVE-2021-42013 affects Apache HTTP Server versions 2.4.49 and 2.4.50.
To fix the vulnerability, update Apache HTTP Server to version 2.4.51 or apply the necessary patches provided by the vendor.