Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-2875

Опубликовано: 06 фев. 2020
Источник: debian
EPSS Низкий

Описание

The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses weak session IDs generated based on OS time, which allows remote attackers to hijack arbitrary sessions via a brute force attack. NOTE: CVE-2014-10399 and CVE-2014-10400 were SPLIT from this ID.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
lua-cgiremovedpackage

Примечания

  • https://github.com/keplerproject/cgilua/issues/17

  • The code itself is broken and thus cannot be exploited per se if not fixed,

  • see details in https://bugs.debian.org/954300

EPSS

Процентиль: 68%
0.00573
Низкий

Связанные уязвимости

CVSS3: 6.1
nvd
около 6 лет назад

The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses weak session IDs generated based on OS time, which allows remote attackers to hijack arbitrary sessions via a brute force attack. NOTE: CVE-2014-10399 and CVE-2014-10400 were SPLIT from this ID.

github
больше 3 лет назад

The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses weak session IDs generated based on OS time, which allows remote attackers to hijack arbitrary sessions via a brute force attack. NOTE: CVE-2014-10300 and CVE-2014-10400 were SPLIT from this ID.

EPSS

Процентиль: 68%
0.00573
Низкий