Session Fixation Affecting apache/httpd package, versions [1.3.11,2.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-APACHEHTTPD-3007458
  • published12 Jan 2022
  • disclosed31 Dec 2001
  • creditUnknown

Introduced: 31 Dec 2001

CVE-2001-1534  (opens in a new tab)
CWE-384  (opens in a new tab)

How to fix?

Upgrade apache/httpd to version 2.0 or higher.

Overview

Affected versions of this package are vulnerable to Session Fixation mod_usertrack in Apache 1.3.11 through 1.3.20 generates session ID's using predictable information including host IP address, system time and server process ID, which allows local users to obtain session ID's and bypass authentication when these session ID's are used for authentication.

References

CVSS Scores

version 3.1