The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses weak session IDs generated based on OS time, which allows remote attackers to hijack arbitrary sessions via a brute force attack. NOTE: CVE-2014-10399 and CVE-2014-10400 were SPLIT from this ID.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2014/Apr/318 | Mailing List Third Party Advisory |
http://www.securityfocus.com/archive/1/531981/100/0/threaded | Third Party Advisory VDB Entry |
http://www.syhunt.com/en/index.php?n=Advisories.Cgilua-weaksessionid | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-02-06T15:26:27
Updated: 2020-03-06T15:16:00
Reserved: 2014-04-16T00:00:00
Link: CVE-2014-2875
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-02-06T16:15:11.370
Modified: 2022-01-01T19:56:52.560
Link: CVE-2014-2875
JSON object: View
Redhat Information
No data.
CWE