{"id":28539195,"url":"https://github.com/mrmtwoj/apache-vulnerability-testing","last_synced_at":"2025-07-08T10:32:25.804Z","repository":{"id":297035991,"uuid":"868234685","full_name":"mrmtwoj/apache-vulnerability-testing","owner":"mrmtwoj","description":"Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 ,  CVE-2024-38473 , CVE-2023-38709","archived":false,"fork":false,"pushed_at":"2024-10-05T20:37:02.000Z","size":5,"stargazers_count":93,"open_issues_count":2,"forks_count":17,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-06-04T00:12:42.018Z","etag":null,"topics":["apache","apache2","cve-2023-3870","cve-2024-38472","cve-2024-38473","cve-2024-38474","cve-2024-38475","cve-2024-38476","cve-2024-38477","cve-2024-39573"],"latest_commit_sha":null,"homepage":"https://acyber.ir","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/mrmtwoj.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2024-10-05T20:32:45.000Z","updated_at":"2025-05-19T10:51:22.000Z","dependencies_parsed_at":"2025-06-04T00:12:45.684Z","dependency_job_id":"779251b3-e348-4254-a487-a7c2d0b395cc","html_url":"https://github.com/mrmtwoj/apache-vulnerability-testing","commit_stats":null,"previous_names":["mrmtwoj/apache-vulnerability-testing"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/mrmtwoj/apache-vulnerability-testing","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mrmtwoj%2Fapache-vulnerability-testing","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mrmtwoj%2Fapache-vulnerability-testing/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mrmtwoj%2Fapache-vulnerability-testing/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mrmtwoj%2Fapache-vulnerability-testing/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/mrmtwoj","download_url":"https://codeload.github.com/mrmtwoj/apache-vulnerability-testing/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mrmtwoj%2Fapache-vulnerability-testing/sbom","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":264250473,"owners_count":23579523,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["apache","apache2","cve-2023-3870","cve-2024-38472","cve-2024-38473","cve-2024-38474","cve-2024-38475","cve-2024-38476","cve-2024-38477","cve-2024-39573"],"created_at":"2025-06-09T18:31:11.315Z","updated_at":"2025-07-08T10:32:25.798Z","avatar_url":"https://github.com/mrmtwoj.png","language":"Python","funding_links":[],"categories":[],"sub_categories":[],"readme":"# Apache HTTP Server Vulnerability Testing Tool\n\nThis repository provides a **Proof of Concept (PoC)** for testing various vulnerabilities in the Apache HTTP Server, including Filename Confusion Attacks, SSRF, Denial of Service, and others related to recent CVEs. The tool sends crafted HTTP requests to assess whether the server is vulnerable to certain types of attacks.\n\n## Features\n- Tests for multiple vulnerabilities including:\n  - **CVE-2024-38472**: Apache HTTP Server on Windows UNC SSRF\n  - **CVE-2024-39573**: mod_rewrite proxy handler substitution\n  - **CVE-2024-38477**: Crash resulting in Denial of Service in mod_proxy\n  - **CVE-2024-38476**: Exploitable backend application output causing internal redirects\n  - **CVE-2024-38475**: mod_rewrite weakness with filesystem path matching\n  - **CVE-2024-38474**: Weakness with encoded question marks in backreferences\n  - **CVE-2024-38473**: mod_proxy proxy encoding problem\n  - **CVE-2023-38709**: HTTP response splitting\n- Provides an easy-to-use command-line interface for testing various endpoints.\n\n## How It Works\nThe tool performs HTTP requests to potential endpoints that might be vulnerable to confusion attacks or misconfigurations. It checks for specific patterns and encodings that could lead to unauthorized access or system failures.\n\n### Testing Targets\nThe tool checks for vulnerabilities on the following paths:\n- **php-info.php**\n- **xmlrpc.php**\n- **adminer.php**\n- **bin/cron.php**\n- **cache/index.tpl.php**\n- **cgi-bin/redir.cgi**\n- Others with encoded URLs for potential bypass.\n\n## Getting Started\n\n### Prerequisites\n- **Python 3.x** installed on your system.\n- **Requests** library for Python to send HTTP requests.\n\nYou can install the required Python library using:\n```bash\npip install requests\n```\n## Installation\nClone this repository:\n```bash\ngit clone https://github.com/mrmtwoj/apache-vulnerability-testing.git\ncd apache-vulnerability-testing\n```\n### Usage\nTo use the tool, provide the target URL you want to test:\n```bash\npython3 poc_vulnerability_testing.py --target http://\u003ctarget-ip\u003e\n```\n### For example:\n```bash\npython3 poc_vulnerability_testing.py --target http://192.168.1.10\n```\n## Command-Line Arguments\n- **target**: The URL of the Apache server to test (e.g., http://example.com).\n- **info**: Display tool information, such as the developer name, version, and related CVEs.\n- **about**: Display information about the tool and its purpose.\n\n\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmrmtwoj%2Fapache-vulnerability-testing","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fmrmtwoj%2Fapache-vulnerability-testing","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmrmtwoj%2Fapache-vulnerability-testing/lists"}