### [CVE-2013-1862](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1862) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator. ### POC #### Reference - http://www-01.ibm.com/support/docview.wss?uid=swg21644047 #### Github - https://github.com/8ctorres/SIND-Practicas - https://github.com/ARPSyndicate/cvemon - https://github.com/DButter/whitehat_public - https://github.com/Dokukin1/Metasploitable - https://github.com/GiJ03/ReconScan - https://github.com/Iknowmyname/Nmap-Scans-M2 - https://github.com/Live-Hack-CVE/CVE-2013-1862 - https://github.com/NikulinMS/13-01-hw - https://github.com/RoliSoft/ReconScan - https://github.com/SecureAxom/strike - https://github.com/Zhivarev/13-01-hw - https://github.com/hrbrmstr/internetdb - https://github.com/issdp/test - https://github.com/kasem545/vulnsearch - https://github.com/matoweb/Enumeration-Script - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/syadg123/pigat - https://github.com/teamssix/pigat - https://github.com/vshaliii/DC-1-Vulnhub-Walkthrough - https://github.com/xxehacker/strike - https://github.com/zzzWTF/db-13-01