If you came here looking for an Apache 2.4.7 exploit, you have come to the right place. You will witness a full dedicated article to an Apache 2.4.7 vulnerability identified by CVE-2014-0226. You can find more information about this CVE here.


Let us introduce ourselves to the Apache 2.4.7 itself before introducing ourselves to and using the exploit. This version of Apache HTTPD was released in November 2013, so you have encountered a pretty old installation of this HTTP server. This version introduced bugfixes in the mod_proxy_fcgi module, as well as the MPM modules.

The “enhancements” to the MPM modules are what make Apache 2.4.7 so vulnerable. Upon improving performance, they have as well left some opportunities for hackers – when compiled with the MPM worker modules, the Apache installation is vulnerable to a memory leak, as well as a Denial of Service.


Enough theory though and let’s see our Apache 2.4.7 exploit. You can download it here.

Keep in mind that this exploit might not work immediately on your Linux machine and you might have to do

dos2unix apache247_exploit.py

before using it. The usage is pretty simple though – just replace the IP address ( in the Python exploit with your target IP address and just run it from the command line:


That’s it! Here you can see a demo screenshot of it running:

Apache 2.4.7 Exploit

The fun, however, doesn’t end there.


There is a Metasploit module related to the Apache version 2.4.7 – the Optionsbleed scanner. To use it, run the following commands on your Metasploit Framework console:

use auxiliary/scanner/http/apache_optionsbleed

set RHOSTS <target host>


If the target is vulnerable to Optionsbleed, you will see an output of arbitrary commands that you can execute on the target host.


That concludes our article on the Apache 2.4.7 exploit. We hope you found it helpful during your penetration test. If you did, please consider sharing this post or subscribing to our newsletter. Good luck and happy hacking.