⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.
Severity
8.1HIGH
EPSS
94.1%
top 0.09%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedMar 26
Latest updateMay 13

Description

In Apache httpd 2.4.0 to 2.4.29, the expression specified in could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages3 packages

Debianapache2< 2.4.33-1+3
NVDapache/http_server2.4.02.4.29

Also affects: Debian Linux 8.0, 9.0, Ubuntu Linux 14.04, 16.04, 17.10, 18.04, Enterprise Linux 6.0, 7.0, 7.4, 7.5, 7.6

🔴Vulnerability Details

6
GHSA
GHSA-p3h3-wpw6-m7vf: In Apache httpd 22022-05-13
OSV
apache2 vulnerabilities2018-04-30
OSV
apache2 vulnerabilities2018-04-19
CVEList
CVE-2017-15715: In Apache httpd 22018-03-26
OSV
CVE-2017-15715: In Apache httpd 22018-03-26

💥Exploits & PoCs

2
Exploit-DB
Mantis Bug Tracker 2.3.0 - Remote Code Execution (Unauthenticated)2020-09-18
Nuclei
Apache httpd <=2.4.29 - Arbitrary File Upload

📋Vendor Advisories

4
Ubuntu
Apache HTTP Server vulnerabilities2018-04-30
Ubuntu
Apache HTTP Server vulnerabilities2018-04-19
Red Hat
httpd: <FilesMatch> bypass with a trailing newline in the file name2018-03-24
Debian
CVE-2017-15715: apache2 - In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could ...2017

💬Community

2
Bugzilla
CVE-2017-15715 httpd: <FilesMatch> bypass with a trailing newline in the file name2018-03-26
Bugzilla
CVE-2017-15715 httpd: <FilesMatch> bypass with a trailing newline in the file name [fedora-all]2018-03-26
CVE-2017-15715 (HIGH CVSS 8.1) | In Apache httpd 2.4.0 to 2.4.29 | cvebase.io