CVE-2017-15715

NameCVE-2017-15715
DescriptionIn Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-4164-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
apache2 (PTS)jessie2.4.10-10+deb8u12fixed
jessie (security)2.4.10-10+deb8u14fixed
stretch (security), stretch2.4.25-3+deb9u7fixed
buster2.4.38-3fixed
bullseye, sid2.4.41-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
apache2source(unstable)2.4.33-1medium
apache2sourcejessie2.4.10-10+deb8u12mediumDSA-4164-1
apache2sourcestretch2.4.25-3+deb9u4mediumDSA-4164-1
apache2sourcewheezy(not affected)

Notes

[wheezy] - apache2 <not-affected> (Vulnerable code not present)
http://www.openwall.com/lists/oss-security/2018/03/24/6

Search for package or bug name: Reporting problems