Rapid7 Vulnerability & Exploit Database

Oracle Linux: CVE-2018-1283: ELSA-2020-3958: httpd security, bug fix, and enhancement update (MODERATE) (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Oracle Linux: CVE-2018-1283: ELSA-2020-3958: httpd security, bug fix, and enhancement update (MODERATE) (Multiple Advisories)

Severity
4
CVSS
(AV:N/AC:M/Au:S/C:N/I:P/A:N)
Published
03/21/2018
Created
10/15/2020
Added
10/13/2020
Modified
08/06/2024

Description

In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.

Solution(s)

  • oracle-linux-upgrade-httpd
  • oracle-linux-upgrade-httpd-devel
  • oracle-linux-upgrade-httpd-manual
  • oracle-linux-upgrade-httpd-tools
  • oracle-linux-upgrade-mod-ldap
  • oracle-linux-upgrade-mod-proxy-html
  • oracle-linux-upgrade-mod-session
  • oracle-linux-upgrade-mod-ssl

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;