Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2021-44790
Severity
9.8CRITICAL
EPSS
86.0%
top 0.61%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 20
Latest updateApr 1
Description
A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages13 packages
Also affects: Debian Linux 10.0, 11.0, Fedora 34, 35, 36
Patches
🔴Vulnerability Details
5GHSA▶
GHSA-c547-2659-q37g: A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts)↗2022-02-08
OSV▶
CVE-2021-44790: A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts)↗2021-12-20
CVEList▶
Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier↗2021-12-20
💥Exploits & PoCs
1📋Vendor Advisories
12Oracle▶
Oracle Oracle Communications Risk Matrix: Management (Apache HTTP Server) — CVE-2021-44790↗2022-10-15
Oracle
▶