Nuclei template designed to detect Apache servers vulnerable to CVE-2024-38473. It first identifies servers running Apache < 2.4.60 with default PHP-FPM settings.
Then, it fuzzes for potential PHP files protected by ACLs that might be bypassed due to this vulnerability.
git clone https://github.com/juanschallibaum/CVE-2024-38473-Nuclei-Template
2. Navigate to the cloned repository directory:
cd CVE-2024-38473-Nuclei-Template
nuclei -t CVE-2024-38473.yaml -u http://example.com
nuclei -t CVE-2024-38473.yaml -l hosts.txt
nuclei -t CVE-2024-38473.yaml -u http://example.com/valid.php
To easily test the CVE-2024-38473 vulnerability, you can set up a vulnerable environment using Docker. Follow these steps to quickly verify the effectiveness of the Nuclei template:
sudo systemctl start docker
For more information click here.
PPLBlade is a powerful Protected Process Dumper designed to capture memory from target processes, hide…
HikPwn: Comprehensive Guide to Scanning Hikvision Devices for Vulnerabilities If you’re searching for an efficient…
What Are Bash Comments? Comments in Bash scripts, are notes in your code that the…
When you write a Bash script in Linux, you want it to run correctly every…
Introduction If you’re new to Bash scripting, one of the first skills you’ll need is…
What is Bash Scripting? Bash scripting allows you to save multiple Linux commands in a file and…