Skip to content

exploit CVE-2024-38475(mod_rewrite weakness with filesystem path matching)

Notifications You must be signed in to change notification settings

soltanali0/CVE-2024-38475

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

CVE-2024-38475

exploit CVE-2024-38475(mod_rewrite weakness with filesystem path matching)

This repository contains a Python script for testing web server vulnerabilities, specifically targeting Apache servers. The script checks for potential issues (mod_rewrite weakness with filesystem path matching) to exposed source code using wordlists for directories and files and applies various payloads.

Usage: To run the script, use the following command:

python3 script.py --webroots webroots.txt --url 127.0.0.1 --schema http --directory_wordlist raft-medium-directories.txt --file_wordlist raft-medium-files.txt

Inspired by:

  1. https://github.com/mrmtwoj/apache-vulnerability-testing
  2. https://github.com/p0in7s/CVE-2024-38475

About

exploit CVE-2024-38475(mod_rewrite weakness with filesystem path matching)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages