mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 19:16:22 +00:00
34 lines
1.6 KiB
Markdown
34 lines
1.6 KiB
Markdown
![]() |
### [CVE-2019-10098](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.oracle.com/security-alerts/cpuApr2021.html
|
||
|
- https://www.oracle.com/security-alerts/cpuapr2020.html
|
||
|
- https://www.oracle.com/security-alerts/cpujan2020.html
|
||
|
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/BitTheByte/Eagle
|
||
|
- https://github.com/Solhack/Team_CSI_platform
|
||
|
- https://github.com/Soundaryakambhampati/test-6
|
||
|
- https://github.com/alex14324/Eagel
|
||
|
- https://github.com/alphaSeclab/sec-daily-2019
|
||
|
- https://github.com/austin-lai/External-Penetration-Testing-Holo-Corporate-Network-TryHackMe-Holo-Network
|
||
|
- https://github.com/bioly230/THM_Skynet
|
||
|
- https://github.com/firatesatoglu/shodanSearch
|
||
|
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
|
||
|
- https://github.com/vshaliii/DC-2-Vulnhub-Walkthrough
|
||
|
- https://github.com/vshaliii/DC-3-Vulnhub-Walkthrough
|
||
|
- https://github.com/vshaliii/Funbox2-rookie
|
||
|
- https://github.com/vshaliii/Vegeta1-Vulhub-Walkthrough
|
||
|
|