The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses weak session IDs generated based on OS time, which allows remote attackers to hijack arbitrary sessions via a brute force attack. NOTE: CVE-2014-10399 and CVE-2014-10400 were SPLIT from this ID.
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2014/Apr/318 | third party advisory mailing list |
http://www.securityfocus.com/archive/1/531981/100/0/threaded | vdb entry third party advisory |
http://www.syhunt.com/en/index.php?n=Advisories.Cgilua-weaksessionid | third party advisory |