### [CVE-2013-1896](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI. ### POC #### Reference - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 #### Github - https://github.com/8ctorres/SIND-Practicas - https://github.com/ARPSyndicate/cvemon - https://github.com/DButter/whitehat_public - https://github.com/Dokukin1/Metasploitable - https://github.com/GiJ03/ReconScan - https://github.com/Iknowmyname/Nmap-Scans-M2 - https://github.com/Live-Hack-CVE/CVE-2013-1896 - https://github.com/MrFrozenPepe/Pentest-Cheetsheet - https://github.com/NikulinMS/13-01-hw - https://github.com/RoliSoft/ReconScan - https://github.com/SecureAxom/strike - https://github.com/Zhivarev/13-01-hw - https://github.com/hrbrmstr/internetdb - https://github.com/issdp/test - https://github.com/matoweb/Enumeration-Script - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/syadg123/pigat - https://github.com/teamssix/pigat - https://github.com/vshaliii/DC-1-Vulnhub-Walkthrough - https://github.com/xxehacker/strike - https://github.com/zzzWTF/db-13-01