5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
3.5 Low
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
0.002 Low
EPSS
Percentile
53.9%
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward
its session data to CGI applications (SessionEnv on, not the default), a
remote user may influence their content by using a “Session” header. This
comes from the “HTTP_SESSION” variable name used by mod_session to forward
its data to CGIs, since the prefix “HTTP_” is also used by the Apache HTTP
Server to pass HTTP header fields, per CGI specifications.
www.openwall.com/lists/oss-security/2018/03/24/4
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
httpd.apache.org/security/vulnerabilities_24.html
launchpad.net/bugs/cve/CVE-2018-1283
nvd.nist.gov/vuln/detail/CVE-2018-1283
security-tracker.debian.org/tracker/CVE-2018-1283
ubuntu.com/security/notices/USN-3627-1
ubuntu.com/security/notices/USN-3627-2
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
3.5 Low
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
0.002 Low
EPSS
Percentile
53.9%