PoC-code voor kwetsbaarheid in Apache HTTP-server gepubliceerd op GitHub

Developer Charles Fol discovered Carpe Diem (CVE-2019-0211) vulnerability in Apache HTTP Server 2.4.

In certain conditions, it allows implementing side code which gives rights of administrator and capturing server management.

Charles Fol gepubliceerd PoC-code on GitHub website.

In the accompanying comments engineer explained that code has intermediate meaning between demonstrative PoC and valid exploit and has educational purposes. Echter, intruders can create full-scale exploit on the base of this code.

Charles Fol recommends shared web-hosting services administrators to install Apache HTTP Server v.2.4.39 version as it eliminates described vulnerability.

CVE-2019-0211 involves only Unix-version of Apache HTTP Server. Debian, Suse, Ubuntu En cPanel developers have already launched corrective updates. For FreeBSD was published notification though patch is still not available.

Bron: https://hackernews.blog/poc-code-published-for-apache-http-server-vulnerability/

Polina Lisovskaja

Ik werk al jaren als marketingmanager en zoek graag naar interessante onderwerpen voor jou

Laat een antwoord achter

Terug naar boven knop