Session Fixation The advisory has been revoked - it doesn't affect any version of package lua-cgi  (opens in a new tab)


Threat Intelligence

EPSS
0.16% (54th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-LUACGI-548265
  • published7 Feb 2020
  • disclosed6 Feb 2020

Introduced: 6 Feb 2020

CVE-2014-10400  (opens in a new tab)
CWE-384  (opens in a new tab)

Amendment

The Debian security team deemed this advisory irrelevant for Debian:unstable.

NVD Description

Note: Versions mentioned in the description apply only to the upstream lua-cgi package and not the lua-cgi package as distributed by Debian.

The session.lua library in CGILua 5.0.x uses sequential session IDs, which makes it easier for remote attackers to predict the session ID and hijack arbitrary sessions. NOTE: this vulnerability was SPLIT from CVE-2014-2875.