漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Apache::Session::Generate::ModUniqueId versions from 1.54 through 1.94 for Perl session ids are insecure
Vulnerability Description
Apache::Session::Generate::ModUniqueId versions from 1.54 through 1.94 for Perl session ids are insecure. Apache::Session::Generate::ModUniqueId (added in version 1.54) uses the value of the UNIQUE_ID environment variable for the session id. The UNIQUE_ID variable is set by the Apache mod_unique_id plugin, which generates unique ids for the request. The id is based on the IPv4 address, the process id, the epoch time, a 16-bit counter and a thread index, with no obfuscation. The server IP is often available to the public, and if not available, can be guessed from previous session ids being issued. The process ids may also be guessed from previous session ids. The timestamp is easily guessed (and leaked in the HTTP Date response header). The purpose of mod_unique_id is to assign a unique id to requests so that events can be correlated in different logs. The id is not designed, nor is it suitable for security purposes.
CVSS Information
N/A
Vulnerability Type
可预测问题
Vulnerability Title
Apache::Session::Generate::ModUniqueId 安全漏洞
Vulnerability Description
Apache::Session::Generate::ModUniqueId是RRWO个人开发者的一个会话ID生成模块。 Apache::Session::Generate::ModUniqueId 1.54版本至1.94版本存在安全漏洞,该漏洞源于使用UNIQUE_ID环境变量生成会话ID,该ID基于IPv4地址、进程ID、纪元时间、16位计数器和线程索引且未混淆,可能导致会话ID不安全。
CVSS Information
N/A
Vulnerability Type
N/A