CVE-2017-15715
Published: 26 March 2018
In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
Priority
Status
Package | Release | Status |
---|---|---|
apache2 Launchpad, Ubuntu, Debian |
upstream |
Released
(2.4.30)
|
trusty |
Released
(2.4.7-1ubuntu4.20)
|
|
xenial |
Released
(2.4.18-2ubuntu3.8)
|
|
artful |
Released
(2.4.27-2ubuntu4.1)
|
|
bionic |
Released
(2.4.29-1ubuntu4.1)
|
|
Patches: upstream: https://svn.apache.org/viewvc?view=revision&revision=1824339 upstream: https://svn.apache.org/viewvc?view=revision&revision=1824439 upstream: https://svn.apache.org/viewvc?view=revision&revision=1824472 (2.4) |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.1 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |