Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-15715

Опубликовано: 24 мар. 2018
Источник: redhat
CVSS3: 3.7
EPSS Критический

Описание

In Apache httpd 2.4.0 to 2.4.29, the expression specified in could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.

Отчет

The "FilesMatch" directive is not enabled in the default httpd configuration as shipped with Red Hat Enterprise Linux, and needs to be explicitly enabled. Therefore this flaw has no impact on the default versions of the httpd package as shipped with Red Hat Enterprise Linux. Red Hat Satellite 6 uses Red Hat Enterprise Linux 7's httpd package, and enables the "FilesMatch" directive. However, this is not believed to have an impact on security, as, in the context of a Satellite, no one is expected to have the ability to modify file names in the concerned directories. This is not considered as a vector for attack.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5httpdNot affected
Red Hat Enterprise Linux 6httpdWill not fix
Red Hat Enterprise Linux 8httpdNot affected
Red Hat JBoss Enterprise Web Server 2httpdWill not fix
Red Hat JBoss Web Server 3httpdNot affected
Red Hat Mobile Application Platform 4rhmap-httpd-dockerNot affected
JBoss Core Services on RHEL 6jbcs-httpd24FixedRHSA-2019:036718.02.2019
JBoss Core Services on RHEL 6jbcs-httpd24-apache-commons-daemon-jsvcFixedRHSA-2019:036718.02.2019
JBoss Core Services on RHEL 6jbcs-httpd24-aprFixedRHSA-2019:036718.02.2019
JBoss Core Services on RHEL 6jbcs-httpd24-apr-utilFixedRHSA-2019:036718.02.2019

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=1560614httpd: <FilesMatch> bypass with a trailing newline in the file name

EPSS

Процентиль: 100%
0.94207
Критический

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 7 лет назад

In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.

CVSS3: 8.1
nvd
около 7 лет назад

In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.

CVSS3: 8.1
debian
около 7 лет назад

In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMat ...

CVSS3: 8.1
github
около 3 лет назад

In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.

CVSS3: 7.3
fstec
около 7 лет назад

Уязвимость компонента &lt;FilesMatch&gt; веб-сервера Apache HTTP Server, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 100%
0.94207
Критический

3.7 Low

CVSS3