CVE-2018-1283
26.03.2018, 15:29
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.Enginsight
| Vendor | Product | Version |
|---|---|---|
| apache | http_server | 2.4.0 ≤ 𝑥 ≤ 2.4.29 |
| debian | debian_linux | 8.0 |
| debian | debian_linux | 9.0 |
| canonical | ubuntu_linux | 14.04 |
| canonical | ubuntu_linux | 16.04 |
| canonical | ubuntu_linux | 17.10 |
| canonical | ubuntu_linux | 18.04 |
| netapp | santricity_cloud_connector | - |
| netapp | storage_automation_store | - |
| netapp | storagegrid | - |
| netapp | clustered_data_ontap | - |
| redhat | enterprise_linux | 6.0 |
| redhat | enterprise_linux | 7.0 |
| redhat | enterprise_linux | 7.4 |
| redhat | enterprise_linux | 7.5 |
| redhat | enterprise_linux | 7.6 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
References