CVE-2017-15715

NameCVE-2017-15715
DescriptionIn Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-4164-1
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
apache2 (PTS)jessie2.4.10-10+deb8u12fixed
jessie (security)2.4.10-10+deb8u16fixed
stretch2.4.25-3+deb9u8fixed
stretch (security)2.4.25-3+deb9u9fixed
buster, buster (security)2.4.38-3+deb10u3fixed
bullseye, sid2.4.41-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
apache2source(unstable)2.4.33-1
apache2sourcejessie2.4.10-10+deb8u12DSA-4164-1
apache2sourcestretch2.4.25-3+deb9u4DSA-4164-1
apache2sourcewheezy(not affected)

Notes

[wheezy] - apache2 <not-affected> (Vulnerable code not present)
http://www.openwall.com/lists/oss-security/2018/03/24/6

Search for package or bug name: Reporting problems