The session.lua library in CGILua 5.0.x uses sequential session IDs, which makes it easier for remote attackers to predict the session ID and hijack arbitrary sessions. NOTE: this vulnerability was SPLIT from CVE-2014-2875.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cgilua | Keplerproject | 5.0.0 (including) | 5.0.1 (including) |
Cgilua | Keplerproject | 5.1.0 (including) | 5.1.4 (including) |
Cgilua | Keplerproject | 5.2-alpha1 (including) | 5.2-alpha1 (including) |
Cgilua | Keplerproject | 5.2-alpha2 (including) | 5.2-alpha2 (including) |
Such a scenario is commonly observed when: