""ET EXPLOIT Apache HTTP Server 2.4.49 - Path Traversal Attempt (CVE-2021-41773) M2""

SID: 2034125

Revision: 4

Class Type: attempted-admin

Metadata: affected_product Apache_HTTP_server, attack_target Web_Server, created_at 2021_10_05, cve CVE_2021_41773, deployment Perimeter, deployment Internet, performance_impact Low, signature_severity Major, updated_at 2022_04_18

Reference:

  • cve

  • 2021-41773

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: any

Destination Network: [$HOME_NET,$HTTP_SERVERS]

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "/.%2e/.%2e/."

  • Value: "/.%2e/.%2e/.%2e/.%2e/"

Within:

PCRE: "/^\/(?:icons|cgi-bin)/I"

Special Options:

  • http_raw_uri

source