The session.lua library in CGILua 5.0.x uses sequential session IDs, which makes it easier for remote attackers to predict the session ID and hijack arbitrary sessions. NOTE: this vulnerability was SPLIT from CVE-2014-2875.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2014/Apr/318 | third party advisory mailing list |
http://www.securityfocus.com/archive/1/531981/100/0/threaded | third party advisory vdb entry |
http://www.syhunt.com/en/index.php?n=Advisories.Cgilua-weaksessionid | third party advisory |