#VU17178 Security restrictions bypass


Published: 2019-01-23 | Updated: 2019-01-24

Vulnerability identifier: #VU17178

Vulnerability risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-17199

CWE-ID: CWE-284

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Apache HTTP Server
Server applications / Web servers

Vendor: Apache Foundation

Description
The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to mod_session checks the session expiry time before decoding the session. A remote attacker сan cause session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded and reuse old session credentials or session IDs, which the attacker could use to access web pages previously accessed by a targeted user. 

Mitigation
Update to version 2.4.38.

Vulnerable software versions

Apache HTTP Server: 2.4.0 - 2.4.37


CPE

External links
http://httpd.apache.org/security/vulnerabilities_24.html


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability