Vulnerability identifier: #VU17178
Vulnerability risk: Low
Exploitation vector: Network
Exploit availability: No
Vendor: Apache Foundation
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to mod_session checks the session expiry time before decoding the session. A remote attacker сan cause session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded and reuse old session credentials or session IDs, which the attacker could use to access web pages previously accessed by a targeted user.
Update to version 2.4.38.
Vulnerable software versions
Apache HTTP Server: 2.4.0 - 2.4.37
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?