.. / CVE-2017-15715

Exploit for Apache httpd <=2.4.29 - Arbitrary File Upload (CVE-2017-15715)

Description:

Apache httpd 2.4.0 to 2.4.29 is susceptible to arbitrary file upload vulnerabilities via the expression specified in , which could match '$' to a newline character in a malicious filename rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are externally blocked, but only by matching the trailing portion of the filename.

Nuclei Template

View the template here CVE-2017-15715.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2017/CVE-2017-15715.yaml
Copy

References:

https://httpd.apache.org/security/vulnerabilities_24.html
http://www.securitytracker.com/id/1040570
https://github.com/vulhub/vulhub/tree/master/httpd/CVE-2017-15715
https://nvd.nist.gov/vuln/detail/CVE-2017-15715
http://www.openwall.com/lists/oss-security/2018/03/24/6