The session.lua library in CGILua 5.0.x uses sequential session IDs, which makes it easier for remote attackers to predict the session ID and hijack arbitrary sessions. NOTE: this vulnerability was SPLIT from CVE-2014-2875.
References
Link | Resource |
---|---|
http://www.syhunt.com/en/index.php?n=Advisories.Cgilua-weaksessionid | Third Party Advisory |
http://seclists.org/fulldisclosure/2014/Apr/318 | Mailing List Third Party Advisory |
http://www.securityfocus.com/archive/1/531981/100/0/threaded | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-02-06 08:15
Updated : 2020-02-11 08:59
NVD link : CVE-2014-10400
Mitre link : CVE-2014-10400
JSON object : View
CWE
CWE-384
Session Fixation
Products Affected
keplerproject
- cgilua