Latest posts
Testing the security of RESTful API
This article will cover a brief overview of some common RESfull API attacks such as Broken Access Control, Cross-Site Request Forgery, and JSON Web Tokens JWT based on the Vulnerable OWASP API security project Websheep which can be found on the OWASP website
read more
Technical analysis and detection of Apache HTTPD CVE-2021-42013
A novel directory traversal bug was introduced in apache httpd-2.4.49 in late September and quickly followed by an incomplete fix on version httpd-2.5.50 that was also followed by a fix on version httpd-2.4.51. We have a previous post describing the vulnerable
code in httpd-2.4.49 and the implemented fix from httpd-2.4.50. In this post, we will discuss the code changes that led to introducing a new bug assigned CVE-2021-42013 that leads to Path Traversal and Remote Code
Execution in httpd-2.4.50 as well as the fix and detection techniques. In the previous post, we learned about apache httpd-2.4.49 and CVE-2021-41773, a fix has been published, and httpd-2.4.50 was released. However,
the fix was incomplete and led to a directory traversal and command execution bug. To approach this fix, we will look at the source code changes to understand what changed then we will be using basic fuzzing techniques
to reproduce the security bug in a test environment.
read more
Tracing vulnerabilities - a hacker mindset approach to CVE-2021-41773
In the last week of September, the world saw a strange vulnerability surfacing which looked like a vanilla directory traversal attack on apache httpd, but at this early stage we could not know how it was introduced or the inner workings of it. The apache
httpd modcgi directory traversal vulnerability was given CVE number 2021-41773, described as a path normalization bug on Apache httpd version 2.4.49. The bug leads to the mapping of URLs to files outside the directories
configured by Alias-like directives, especially if these files are not protected by the usual default configuration "require all denied".
read more