Описание
The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses weak session IDs generated based on OS time, which allows remote attackers to hijack arbitrary sessions via a brute force attack. NOTE: CVE-2014-10399 and CVE-2014-10400 were SPLIT from this ID.
Ссылки
- Mailing ListThird Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Mailing ListThird Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 5.0.0 (включая) до 5.0.1 (включая)Версия от 5.1.0 (включая) до 5.1.4 (включая)
Одно из
cpe:2.3:a:keplerproject:cgilua:*:*:*:*:*:*:*:*
cpe:2.3:a:keplerproject:cgilua:*:*:*:*:*:*:*:*
cpe:2.3:a:keplerproject:cgilua:5.2:alpha1:*:*:*:*:*:*
cpe:2.3:a:keplerproject:cgilua:5.2:alpha2:*:*:*:*:*:*
EPSS
Процентиль: 68%
0.00573
Низкий
6.1 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-307
Связанные уязвимости
CVSS3: 6.1
debian
около 6 лет назад
The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses wea ...
github
больше 3 лет назад
The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses weak session IDs generated based on OS time, which allows remote attackers to hijack arbitrary sessions via a brute force attack. NOTE: CVE-2014-10300 and CVE-2014-10400 were SPLIT from this ID.
EPSS
Процентиль: 68%
0.00573
Низкий
6.1 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-307