Files
CVEs-PoC/2017/CVE-2017-15715.md
T
2024-08-05 18:41:32 +00:00

70 lines
3.5 KiB
Markdown

### [CVE-2017-15715](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20HTTP%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=%3CFilesMatch%3E%20bypass%20with%20a%20trailing%20newline%20in%20the%20file%20name&color=brighgreen)
### Description
In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
### POC
#### Reference
- https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html
#### Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/0day666/Vulnerability-verification
- https://github.com/422926799/haq5201314
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/AlanShami/Red-Team-vs-Blue-Team-Project
- https://github.com/ArrestX/--POC
- https://github.com/Awrrays/FrameVul
- https://github.com/Chad-Atkinson/Red-vs-Blue-team-project
- https://github.com/ChadSWilliamson/Red-vs.-Blue-Project
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/Fa1c0n35/Web-CTF-Cheatshee
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/PawanKumarPandit/Shodan-nrich
- https://github.com/RoseSecurity-Research/Red-Teaming-TTPs
- https://github.com/RoseSecurity/Red-Teaming-TTPs
- https://github.com/SamGeron/Red-Team-vs-Blue-Team
- https://github.com/SexyBeast233/SecBooks
- https://github.com/ShattenJager81/Cyber-2
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/Xorlent/Red-Teaming-TTPs
- https://github.com/Zero094/Vulnerability-verification
- https://github.com/austin-lai/External-Penetration-Testing-Holo-Corporate-Network-TryHackMe-Holo-Network
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/bioly230/THM_Skynet
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/duckstroms/Web-CTF-Cheatsheet
- https://github.com/enomothem/PenTestNote
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/hacden/vultools
- https://github.com/hailan09/Hacker
- https://github.com/hktalent/bug-bounty
- https://github.com/hxysaury/The-Road-to-Safety
- https://github.com/hxysaury/saury-vulnhub
- https://github.com/intrigueio/intrigue-ident
- https://github.com/jiushill/haq5201314
- https://github.com/kabir0104k/ethan
- https://github.com/q99266/saury-vulnhub
- https://github.com/retr0-13/nrich
- https://github.com/rnbochsr/yr_of_the_jellyfish
- https://github.com/rochoabanuelos/Red-Team-vs-Blue-Team-Analysis
- https://github.com/safe6Sec/PentestNote
- https://github.com/shamsulchowdhury/Unit-20-Project-2-Red-vs-Blue-Team
- https://github.com/shuanx/vulnerability
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
- https://github.com/vshaliii/DC-2-Vulnhub-Walkthrough
- https://github.com/vshaliii/DC-3-Vulnhub-Walkthrough
- https://github.com/vshaliii/Funbox2-rookie
- https://github.com/w181496/Web-CTF-Cheatsheet
- https://github.com/whisp1830/CVE-2017-15715
- https://github.com/zha0/Bei-Gai-penetration-test-guide