A flaw was found in a change made to path normalization in Apache HTTP
Server 2.4.49. An attacker could use a path traversal attack to map URLs to
files outside the directories configured by Alias-like directives. If files
outside of these directories are not protected by the usual default
configuration βrequire all deniedβ, these requests can succeed. If CGI
scripts are also enabled for these aliased pathes, this could allow for
remote code execution. This issue is known to be exploited in the wild.
This issue only affects Apache 2.4.49 and not earlier versions. The fix in
Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.
www.openwall.com/lists/oss-security/2021/10/05/2
httpd.apache.org/security/vulnerabilities_24.html
httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-41773
launchpad.net/bugs/cve/CVE-2021-41773
lists.apache.org/thread.html/r6abf5f2ba6f1aa8b1030f95367aaf17660c4e4c78cb2338aee18982f@%3Cusers.httpd.apache.org%3E
lists.apache.org/thread.html/r98d704ed4377ed889d40479db79ed1ee2f43b2ebdd79ce84b042df45@%3Cannounce.apache.org%3E
nvd.nist.gov/vuln/detail/CVE-2021-41773
security-tracker.debian.org/tracker/CVE-2021-41773
www.cve.org/CVERecord?id=CVE-2021-41773
www.openwall.com/lists/oss-security/2021/10/05/2