|
|
Message-ID: <6d030a89-4b22-4b13-950d-ce5a6cd48caf@cpansec.org> Date: Fri, 8 May 2026 08:45:57 +0100 From: Robert Rothenberg <rrwo@...nsec.org> To: cve-announce@...urity.metacpan.org, oss-security@...ts.openwall.com Subject: CVE-2013-10075: Apache::Session versions through 1.94 for Perl re-creates deleted sessions ======================================================================== CVE-2013-10075 CPAN Security Group ======================================================================== CVE ID: CVE-2013-10075 Distribution: Apache-Session Versions: through 1.94 MetaCPAN: https://metacpan.org/dist/Apache-Session VCS Repo: http://github.com/chorny/Apache-Session Apache::Session versions through 1.94 for Perl re-creates deleted sessions Description ----------- Apache::Session versions through 1.94 for Perl re-creates deleted sessions. The session stores Apache::Session::Store::File and Apache::Session::Store::DB_File will create a session that does not exist. This can lead to sessions being revived, potentially with data that was to be deleted. Problem types ------------- - CWE-672 Operation on a Resource after Expiration or Release Workarounds ----------- Use a database store based on Apache::Session::Store::DBI. References ---------- https://rt.cpan.org/Public/Bug/Display.html?id=83525 Timeline -------- - 2013-02-21: Issue reported Credits ------- Thomas Sibley, finder
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.