cve/2013/CVE-2013-1862.md

38 lines
1.6 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2013-1862](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1862)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator.
### POC
#### Reference
- http://www-01.ibm.com/support/docview.wss?uid=swg21644047
#### Github
- https://github.com/8ctorres/SIND-Practicas
- https://github.com/ARPSyndicate/cvemon
- https://github.com/DButter/whitehat_public
- https://github.com/Dokukin1/Metasploitable
- https://github.com/GiJ03/ReconScan
- https://github.com/Iknowmyname/Nmap-Scans-M2
- https://github.com/Live-Hack-CVE/CVE-2013-1862
- https://github.com/NikulinMS/13-01-hw
- https://github.com/RoliSoft/ReconScan
- https://github.com/SecureAxom/strike
- https://github.com/Zhivarev/13-01-hw
- https://github.com/hrbrmstr/internetdb
- https://github.com/issdp/test
- https://github.com/kasem545/vulnsearch
- https://github.com/matoweb/Enumeration-Script
- https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems
- https://github.com/syadg123/pigat
- https://github.com/teamssix/pigat
- https://github.com/vshaliii/DC-1-Vulnhub-Walkthrough
- https://github.com/xxehacker/strike
- https://github.com/zzzWTF/db-13-01