Description
In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4164-1 | apache2 security update |
Ubuntu USN |
USN-3627-1 | Apache HTTP Server vulnerabilities |
Ubuntu USN |
USN-3627-2 | Apache HTTP Server vulnerabilities |
References
History
No history.
Subscriptions
Apache
Subscribe
Http Server
Subscribe
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Netapp
Subscribe
Clustered Data Ontap
Subscribe
Santricity Cloud Connector
Subscribe
Storage Automation Store
Subscribe
Storagegrid
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Jboss Core Services
Subscribe
Rhel Software Collections
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-17T02:21:04.135Z
Reserved: 2017-10-21T00:00:00.000Z
Link: CVE-2017-15715
No data.
Status : Modified
Published: 2018-03-26T15:29:00.287
Modified: 2024-11-21T03:15:04.313
Link: CVE-2017-15715
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN