Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c8vc-vjpf-2fph

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses weak session IDs generated based on OS time, which allows remote attackers to hijack arbitrary sessions via a brute force attack. NOTE: CVE-2014-10300 and CVE-2014-10400 were SPLIT from this ID.

The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses weak session IDs generated based on OS time, which allows remote attackers to hijack arbitrary sessions via a brute force attack. NOTE: CVE-2014-10300 and CVE-2014-10400 were SPLIT from this ID.

EPSS

Процентиль: 68%
0.00573
Низкий

Дефекты

CWE-307

Связанные уязвимости

CVSS3: 6.1
nvd
около 6 лет назад

The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses weak session IDs generated based on OS time, which allows remote attackers to hijack arbitrary sessions via a brute force attack. NOTE: CVE-2014-10399 and CVE-2014-10400 were SPLIT from this ID.

CVSS3: 6.1
debian
около 6 лет назад

The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses wea ...

EPSS

Процентиль: 68%
0.00573
Низкий

Дефекты

CWE-307