cve/2021/CVE-2021-26690.md
2025-09-29 21:09:30 +02:00

65 lines
4.0 KiB
Markdown

### [CVE-2021-26690](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20HTTP%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.4.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.10%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.12%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.16%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.17%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.18%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.20%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.23%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.25%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.26%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.27%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.28%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.29%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.33%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.34%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.35%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.37%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.38%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.39%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.41%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.43%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.46%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.7%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.4.9%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=mod_session%20NULL%20pointer%20dereference&color=brightgreen)
### Description
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service
### POC
#### Reference
- https://www.oracle.com/security-alerts/cpuoct2021.html
#### Github
- https://github.com/0xdeviner/CVE-2021-26690
- https://github.com/20142995/nuclei-templates
- https://github.com/7own/CVE-2021-26690---Apache-mod_session
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NeoOniX/5ATTACK
- https://github.com/PierreChrd/py-projet-tut
- https://github.com/REal0day/apache-cve
- https://github.com/Samaritin/OSINT
- https://github.com/Totes5706/TotesHTB
- https://github.com/austin-lai/External-Penetration-Testing-Holo-Corporate-Network-TryHackMe-Holo-Network
- https://github.com/bioly230/THM_Skynet
- https://github.com/cyb3r-w0lf/nuclei-template-collection
- https://github.com/danielduan2002/CVE-2021-26690
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/fkm75P8YjLkb/CVE-2021-26690
- https://github.com/jkiala2/Projet_etude_M1
- https://github.com/lekctut/sdb-hw-13-01
- https://github.com/n0-traces/cve_monitor
- https://github.com/pedr0alencar/vlab-metasploitable2