CVE-2021-41773 Exploitation Attempt

Detects exploitation of flaw in path normalization in Apache HTTP server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions.

Sigma rule (View on GitHub)

 1title: CVE-2021-41773 Exploitation Attempt
 2id: 3007fec6-e761-4319-91af-e32e20ac43f5
 3status: test
 4description: |
 5  Detects exploitation of flaw in path normalization in Apache HTTP server 2.4.49.
 6  An attacker could use a path traversal attack to map URLs to files outside the expected document root.
 7  If files outside of the document root are not protected by "require all denied" these requests can succeed.
 8  Additionally this flaw could leak the source of interpreted files like CGI scripts.
 9  This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions.  
10references:
11    - https://nvd.nist.gov/vuln/detail/CVE-2021-41773
12    - https://github.com/apache/httpd/commit/e150697086e70c552b2588f369f2d17815cb1782
13    - https://twitter.com/ptswarm/status/1445376079548624899
14    - https://twitter.com/h4x0r_dz/status/1445401960371429381
15    - https://github.com/projectdiscovery/nuclei-templates/blob/9d2889356eebba661c8407038e430759dfd4ec31/cves/2021/CVE-2021-41773.yaml
16    - https://twitter.com/bl4sty/status/1445462677824761878
17author: daffainfo, Florian Roth
18date: 2021/10/05
19modified: 2023/01/02
20tags:
21    - attack.initial_access
22    - attack.t1190
23    - cve.2021.41773
24    - detection.emerging_threats
25logsource:
26    category: webserver
27detection:
28    selection:
29        cs-uri-query|contains:
30            - '/cgi-bin/.%2e/'
31            - '/icons/.%2e/'
32            - '/cgi-bin/.%%32%65/'
33            - '/icons/.%%32%65/'
34            - '/cgi-bin/.%%%25%33'
35            - '/icons/.%%%25%33'
36        sc-status:
37            - 200
38            - 301
39    condition: selection
40falsepositives:
41    - Unknown
42level: high

References

Related rules

to-top