""ET EXPLOIT Apache HTTP Server 2.4.49 - Path Traversal Attempt (CVE-2021-41773) M2""
SID: 2034125
Revision: 4
Class Type: attempted-admin
Metadata: affected_product Apache_HTTP_server, attack_target Web_Server, created_at 2021_10_05, cve CVE_2021_41773, deployment Perimeter, deployment Internet, performance_impact Low, signature_severity Major, updated_at 2022_04_18
Reference:
-
cve
-
2021-41773
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: any
Destination Network: [$HOME_NET,$HTTP_SERVERS]
Destination Port: $HTTP_PORTS
Flow: established,to_server
Contents:
-
Value: "/.%2e/.%2e/."
-
Value: "/.%2e/.%2e/.%2e/.%2e/"
Within:
PCRE: "/^\/(?:icons|cgi-bin)/I"
Special Options:
- http_raw_uri