In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2017-15715 from the MITRE CVE dictionary dictionary and NIST NVD.
The "FilesMatch" directive is not enabled in the default httpd configuration as shipped with Red Hat Enterprise Linux, and needs to be explicitly enabled. Therefore this flaw has no impact on the default versions of the httpd package as shipped with Red Hat Enterprise Linux.
CVSS3 Base Score | 3.7 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N |
Attack Vector | Network |
Attack Complexity | High |
Privileges Required | None |
User Interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity Impact | Low |
Availability Impact | None |
Platform | Errata | Release Date |
---|---|---|
Red Hat Software Collections for Red Hat Enterprise Linux 6 (httpd24-httpd) | RHSA-2018:3558 | 2018-11-13 |
Red Hat Software Collections for Red Hat Enterprise Linux 7 (httpd24-httpd) | RHSA-2018:3558 | 2018-11-13 |
Platform | Package | State |
---|---|---|
Red Hat Mobile Application Platform On-Premise 4 | rhmap-httpd-docker | Not affected |
Red Hat JBoss Web Server 3 | httpd | Not affected |
Red Hat JBoss EWS 2 | httpd | Will not fix |
Red Hat JBoss Core Services 1 | httpd | Affected |
Red Hat Enterprise Linux 7 | httpd | Affected |
Red Hat Enterprise Linux 6 | httpd | Will not fix |
Red Hat Enterprise Linux 5 | httpd | Not affected |