CVE-2014-2875

The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses weak session IDs generated based on OS time, which allows remote attackers to hijack arbitrary sessions via a brute force attack. NOTE: CVE-2014-10399 and CVE-2014-10400 were SPLIT from this ID.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:keplerproject:cgilua:*:*:*:*:*:*:*:*
cpe:2.3:a:keplerproject:cgilua:*:*:*:*:*:*:*:*
cpe:2.3:a:keplerproject:cgilua:5.2:alpha1:*:*:*:*:*:*
cpe:2.3:a:keplerproject:cgilua:5.2:alpha2:*:*:*:*:*:*

History

21 Nov 2024, 02:07

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2014/Apr/318 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2014/Apr/318 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/archive/1/531981/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/531981/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.syhunt.com/en/index.php?n=Advisories.Cgilua-weaksessionid - Third Party Advisory () http://www.syhunt.com/en/index.php?n=Advisories.Cgilua-weaksessionid - Third Party Advisory

Information

Published : 2020-02-06 16:15

Updated : 2024-11-21 02:07


NVD link : CVE-2014-2875

Mitre link : CVE-2014-2875

CVE.ORG link : CVE-2014-2875


JSON object : View

Products Affected

keplerproject

  • cgilua
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts