CVE-2018-1283
26.03.2018, 15:29
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.Enginsight
Vendor | Product | Version |
---|---|---|
apache | http_server | 2.4.0 ≤ 𝑥 ≤ 2.4.29 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 17.10 |
canonical | ubuntu_linux | 18.04 |
netapp | santricity_cloud_connector | - |
netapp | storage_automation_store | - |
netapp | storagegrid | - |
netapp | clustered_data_ontap | - |
redhat | enterprise_linux | 6.0 |
redhat | enterprise_linux | 7.0 |
redhat | enterprise_linux | 7.4 |
redhat | enterprise_linux | 7.5 |
redhat | enterprise_linux | 7.6 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References