CVE-2018-17199

Severity
7.5HIGH
EPSS
10.5%
top 6.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 30
Latest updateMay 13

Description

In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

NVDapache/http_server2.4.02.4.37
CVEListV5apache_software_foundation/apache_http_serverApache HTTP Server 2.4.0 to 2.4.37
Debianapache2< 2.4.38-1+3

Also affects: Debian Linux 8.0, 9.0, Ubuntu Linux 14.04, 16.04, 18.04, 18.10

Patches

🔴Vulnerability Details

4
GHSA
GHSA-gxfm-3qhv-h52c: In Apache HTTP Server 22022-05-13
OSV
apache2 vulnerabilities2019-04-04
OSV
CVE-2018-17199: In Apache HTTP Server 22019-01-30
CVEList
CVE-2018-17199: In Apache HTTP Server 22019-01-30

📋Vendor Advisories

3
Ubuntu
Apache HTTP Server vulnerabilities2019-04-04
Red Hat
httpd: mod_session_cookie does not respect expiry time2019-01-22
Debian
CVE-2018-17199: apache2 - In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the sessi...2018

💬Community

2
Bugzilla
CVE-2018-17199 httpd: mod_session_cookie does not respect expiry time2019-01-22
Bugzilla
CVE-2018-17199 httpd: mod_session_cookie does not respect expiry time [fedora-all]2019-01-22
CVE-2018-17199 (HIGH CVSS 7.5) | In Apache HTTP Server 2.4 release 2 | cvebase.io