mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.
References
Configurations
History
07 Nov 2023, 02:14
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
14 Sep 2022, 18:42
Type | Values Removed | Values Added |
---|---|---|
References | (MLIST) https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (CONFIRM) http://www.apache.org/dist/httpd/CHANGES_2.4.6 - Broken Link, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (CONFIRM) http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/session/mod_session_dbd.c?r1=1409170&r2=1488158&diff_format=h - Exploit, Patch, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (CISCO) http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-2249 - Broken Link, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
References | (CONFIRM) https://httpd.apache.org/security/vulnerabilities_24.html - Vendor Advisory | |
References | (CONFIRM) http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 - Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E - Mailing List, Vendor Advisory | |
CPE | cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.1.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.7:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.65:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.42:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.34:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1.4:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.29:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.12:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.14:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.32:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.41:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.11:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.31:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1.7:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.0.3:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.16:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.3:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.24:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.2.5:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.13:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.38:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.36:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1.8:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.7:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.5:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.8:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:0.8.11:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.28:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.30:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1.9:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.15:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1.5:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.0.5:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.99:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.10:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.2:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.4:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.13:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.6:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.8:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.33:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1.6:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.10:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_space:15.1:r1:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.0:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.1.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.68:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.2.6:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1.3:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.64:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.0:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.9:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:0.8.14:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1.2:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.0.2:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.2.4:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.5:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.16:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.37:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.35:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.4.0:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.2:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.25:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.2.9:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.2:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.39:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.3.1:*:*:*:*:*:*:* |
06 Jun 2021, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jun 2021, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Mar 2021, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2013-07-23 17:20
Updated : 2023-12-10 11:16
NVD link : CVE-2013-2249
Mitre link : CVE-2013-2249
CVE.ORG link : CVE-2013-2249
JSON object : View
Products Affected
apache
- http_server
CWE