Описание
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
Релиз | Статус | Примечание |
---|---|---|
artful | released | 2.4.27-2ubuntu4.1 |
bionic | released | 2.4.29-1ubuntu4.1 |
devel | released | 2.4.29-1ubuntu4.1 |
esm-infra-legacy/trusty | not-affected | 2.4.7-1ubuntu4.20 |
esm-infra/bionic | not-affected | 2.4.29-1ubuntu4.1 |
esm-infra/xenial | not-affected | 2.4.18-2ubuntu3.8 |
precise/esm | not-affected | |
trusty | released | 2.4.7-1ubuntu4.20 |
trusty/esm | not-affected | 2.4.7-1ubuntu4.20 |
upstream | released | 2.4.30 |
Показывать по
EPSS
3.5 Low
CVSS2
5.3 Medium
CVSS3
Связанные уязвимости
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to for ...
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
Уязвимость модуля mod_session веб-сервера Apache HTTP Server, позволяющая нарушителю оказать воздействие на целостность защищаемых данных
EPSS
3.5 Low
CVSS2
5.3 Medium
CVSS3