Nuclei template designed to detect Apache servers vulnerable to CVE-2024-38473. It first identifies servers running Apache < 2.4.60 with default PHP-FPM settings.
Then, it fuzzes for potential PHP files protected by ACLs that might be bypassed due to this vulnerability.
git clone https://github.com/juanschallibaum/CVE-2024-38473-Nuclei-Template 2. Navigate to the cloned repository directory:
cd CVE-2024-38473-Nuclei-Template nuclei -t CVE-2024-38473.yaml -u http://example.com nuclei -t CVE-2024-38473.yaml -l hosts.txt nuclei -t CVE-2024-38473.yaml -u http://example.com/valid.php To easily test the CVE-2024-38473 vulnerability, you can set up a vulnerable environment using Docker. Follow these steps to quickly verify the effectiveness of the Nuclei template:
sudo systemctl start docker For more information click here.
Have you ever come across a picture on the internet and wondered where it came…
Overview WhatsMyName is a free, community-driven OSINT tool designed to identify where a username exists…
Managing disk usage is a crucial task for Linux users and administrators alike. Understanding which…
Efficient disk space management is vital in Linux, especially for system administrators who manage servers…
Knowing how to check directory sizes in Linux is essential for managing disk space and…
Managing user accounts is a core responsibility for any Linux administrator. Whether you’re securing a…