Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1283

Опубликовано: 21 мар. 2018
Источник: redhat
CVSS3: 4.8
EPSS Низкий

Описание

In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.

It has been discovered that the mod_session module of Apache HTTP Server (httpd), through version 2.4.29, has an improper input validation flaw in the way it handles HTTP session headers in some configurations. A remote attacker may influence their content by using a "Session" header.

Отчет

This issue did not affect the versions of httpd as shipped with Red Hat Enterprise Linux 5 and 6 as they did not include mod_session module.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5httpdNot affected
Red Hat Enterprise Linux 6httpdNot affected
Red Hat Enterprise Linux 8httpdNot affected
Red Hat JBoss Enterprise Application Platform 5httpdNot affected
Red Hat JBoss Enterprise Application Platform 6httpdNot affected
Red Hat JBoss Enterprise Web Server 2httpdNot affected
Red Hat JBoss Web Server 3httpdNot affected
Red Hat Mobile Application Platform 4rhmap-httpd-dockerNot affected
JBoss Core Services on RHEL 6jbcs-httpd24FixedRHSA-2019:036718.02.2019
JBoss Core Services on RHEL 6jbcs-httpd24-apache-commons-daemon-jsvcFixedRHSA-2019:036718.02.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1560395httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications

EPSS

Процентиль: 90%
0.05646
Низкий

4.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 7 лет назад

In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.

CVSS3: 5.3
nvd
около 7 лет назад

In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.

CVSS3: 5.3
debian
около 7 лет назад

In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to for ...

CVSS3: 5.3
github
около 3 лет назад

In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.

CVSS3: 4.3
fstec
около 7 лет назад

Уязвимость модуля mod_session веб-сервера Apache HTTP Server, позволяющая нарушителю оказать воздействие на целостность защищаемых данных

EPSS

Процентиль: 90%
0.05646
Низкий

4.8 Medium

CVSS3