First published: Thu Oct 07 2021(Updated: )
Apache HTTP Server contains a path traversal vulnerability that allows an attacker to perform remote code execution if files outside directories configured by Alias-like directives are not under default require all denied or if CGI scripts are enabled. This CVE ID resolves an incomplete patch for CVE-2021-41773.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | ||
Apache Http Server | =2.4.49 | |
Apache Http Server | =2.4.50 | |
Fedora | =34 | |
Fedora | =35 | |
oracle instantis enterprisetrack | =17.1 | |
oracle instantis enterprisetrack | =17.2 | |
oracle instantis enterprisetrack | =17.3 | |
Oracle JD Edwards EnterpriseOne Tools | <9.2.6.0 | |
Oracle Secure Backup | <18.1.0.1.0 | |
netapp cloud backup |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-42013.
The title of the vulnerability is Apache HTTP Server Path Traversal Vulnerability.
The severity of CVE-2021-42013 is critical with a CVSS score of 9.8.
CVE-2021-42013 affects Apache HTTP Server versions 2.4.49 and 2.4.50.
To fix the vulnerability, update Apache HTTP Server to version 2.4.51 or apply the necessary patches provided by the vendor.