Red Hat Bugzilla – Bug 1560614
CVE-2017-15715 httpd: <FilesMatch> bypass with a trailing newline in the file name
Last modified: 2018-10-26 10:13:56 EDT
The expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are externally blocked, but only by matching the trailing portion of the filename. Versions Affected: httpd 2.4.0 to 2.4.29 External References: https://httpd.apache.org/security/vulnerabilities_24.html
Created httpd tracking bugs for this issue: Affects: fedora-all [bug 1560618]
Upstream patch: https://svn.apache.org/viewvc?view=revision&revision=1824339 As per the upstream changelog, the following change was made for this flaw: Configure the regular expression engine to match '$' to the end of the input string only, excluding matching the end of any embedded newline characters. Behavior can be changed with new directive 'RegexDefaultOptions'.
Statement: The "FilesMatch" directive is not enabled in the default httpd configuration as shipped with Red Hat Enterprise Linux, and needs to be explicitly enabled. Therefore this flaw has no impact on the default versions of the httpd package as shipped with Red Hat Enterprise Linux.