#VU17178 Security restrictions bypass

Published: 2019-01-23 | Updated: 2019-01-24

Vulnerability identifier: #VU17178

Vulnerability risk: Low


CVE-ID: CVE-2018-17199


Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Apache HTTP Server
Server applications / Web servers

Vendor: Apache Foundation

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to mod_session checks the session expiry time before decoding the session. A remote attacker сan cause session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded and reuse old session credentials or session IDs, which the attacker could use to access web pages previously accessed by a targeted user. 

Update to version 2.4.38.

Vulnerable software versions

Apache HTTP Server: 2.4.0 - 2.4.37


External links

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

Latest bulletins with this vulnerability