### [CVE-2021-39275](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275) ![](https://img.shields.io/static/v1?label=Product&message=Apache%20HTTP%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=Apache%20HTTP%20Server%202.4%3C%3D%202.4.48%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Buffer%20Overflow&color=brighgreen) ### Description ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier. ### POC #### Reference - https://www.oracle.com/security-alerts/cpuapr2022.html - https://www.oracle.com/security-alerts/cpujan2022.html #### Github - https://github.com/8ctorres/SIND-Practicas - https://github.com/ARPSyndicate/cvemon - https://github.com/PierreChrd/py-projet-tut - https://github.com/Totes5706/TotesHTB - https://github.com/bioly230/THM_Skynet - https://github.com/firatesatoglu/shodanSearch - https://github.com/kasem545/vulnsearch