Description
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
Remediation
References
Related Vulnerabilities
Apache HTTP Server Out-of-bounds Read Vulnerability (CVE-2007-3847)
WordPress Plugin WordPress Download Manager Cross-Site Scripting (3.2.15)
WordPress Plugin CigiCigi Post Guest Cross-Site Scripting (1.0.5)
MySQL CVE-2023-22065 Vulnerability (CVE-2023-22065)
WordPress Plugin Member Approval Cross-Site Request Forgery (131109)