Skip to content

styx00/Apache-Vulns

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

31 Commits
 
 
 
 
 
 

Repository files navigation

Apache-Vulns

Pentest Scripts for Apache Vulnerabilities.

  1. apacheScan.py
  • The purpose of this script is to enable pentesters to quickly check which CVE-IDs apply to a particular Apache version. apacheScan comes with a text file which contains all CVE-IDs taken from [https://httpd.apache.org] (https://httpd.apache.org). The python script simply retrieves the CVE-IDs that apply to the given Apache version from the apache_CVE.txt file. It currently supports Apache version 2.2.* and 2.4.*.

  • TODO:

    • Add option to check which versions are affected by a particular CVE-ID.
    • Add support for more versions, i.e., 1.3.* and 2.0.*.
    • Add option that will probe a target in an attempt to get its banner.
    • Add active tests in an attempt to fingerprint the targets' version.
      • e.g., CVE-2012-0053 httpOnly Cookie Disclosure, byterange DoS, etc.
      • Add functionality to search for default files that may disclose the version.
    • Update the apache_CVE.txt file to include if public exploits are available, and the risk rating of each CVE-ID.
    • Improve code quality
  1. apache_httpOnly_CVE-2012-0053.sh
  • This script checks for [CVE-2012-0053] (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053). Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information which allows remote attackers to obtain the values of HttpOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.

About

Pentest Scripts for Apache Vulnerabilities

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published