First published: Mon Mar 26 2018(Updated: )
In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.30 | 2.4.30 |
debian/apache2 | 2.4.62-1~deb11u1 2.4.62-1~deb11u2 2.4.62-1~deb12u2 2.4.63-1 | |
Apache Http Server | >=2.4.0<=2.4.29 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
Ubuntu | =18.04 | |
NetApp SANtricity Cloud Connector | ||
NetApp Storage Automation Store | ||
netapp storagegrid | ||
IBM Data ONTAP | ||
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =7.4 | |
Red Hat Enterprise Linux | =7.5 | |
Red Hat Enterprise Linux | =7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15715 is a vulnerability in Apache httpd 2.4.0 to 2.4.29 that allows a malicious filename to match '$' to a newline character.
The severity of CVE-2017-15715 is high, with a severity value of 8.1.
Apache httpd versions 2.4.0 to 2.4.29 are affected by CVE-2017-15715.
To fix CVE-2017-15715, upgrade Apache httpd to version 2.4.30 or later.
You can find more information about CVE-2017-15715 on the Apache HTTP Server website and the Red Hat Bugzilla page.