Description
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4164-1 | apache2 security update |
EUVD |
EUVD-2018-11901 | In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications. |
Ubuntu USN |
USN-3627-1 | Apache HTTP Server vulnerabilities |
Ubuntu USN |
USN-3627-2 | Apache HTTP Server vulnerabilities |
References
History
No history.
Subscriptions
Apache
Subscribe
Http Server
Subscribe
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Netapp
Subscribe
Clustered Data Ontap
Subscribe
Santricity Cloud Connector
Subscribe
Storage Automation Store
Subscribe
Storagegrid
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Jboss Core Services
Subscribe
Rhel Software Collections
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T19:36:29.564Z
Reserved: 2017-12-07T00:00:00.000Z
Link: CVE-2018-1283
No data.
Status : Modified
Published: 2018-03-26T15:29:00.367
Modified: 2024-11-21T03:59:32.380
Link: CVE-2018-1283
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN