CVE-2014-2875
Linux Debian vulnerability analysis and mitigation

Overview

The vulnerability (CVE-2014-2875) affects the session.lua library in CGILua versions 5.2 alpha 1 and 5.2 alpha 2. The vulnerability was discovered on March 27, 2014, and publicly disclosed on April 30, 2014. The issue stems from weak session ID generation based on OS time, making the sessions vulnerable to hijacking (Syhunt Advisory).

Technical details

The vulnerability is characterized by the generation of weak and predictable session IDs, typically 9-digit long or shorter, based on operating system time. The session ID generation mechanism is publicly visible in the GitHub repository, making it easier for attackers to understand and exploit. The vulnerability has been assigned a CVSS v3.1 Base Score of 6.1 (Medium) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N (NVD).

Impact

The vulnerability allows remote attackers to hijack arbitrary sessions through brute force attacks by predicting valid session IDs. This could potentially lead to unauthorized access to user sessions of logged-in users (Syhunt Advisory).

Mitigation and workarounds

The recommended mitigation is to avoid using CGILua's session.lua library until a proper patch is issued. For those who wish to implement a manual fix, it is suggested to use the luuid library, which generates 128-bit random IDs, or any other Lua library capable of generating unique IDs based on high-quality randomness. After patching, all sessions generated by the unpatched code should be invalidated (Syhunt Advisory).

Community reactions

The project maintainer, Tomás Guisasola, initially did not consider the session IDs generated by CGILua 5.0 and 5.2 to be insecure and believed that enhancing the randomness would not improve security. This stance led to the vulnerability remaining unpatched after its disclosure (Syhunt Advisory).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22857MEDIUM6.8
  • Linux DebianLinux Debian
  • freerdp-plugins
NoNoJan 14, 2026
CVE-2026-22856MEDIUM6.8
  • Linux DebianLinux Debian
  • freerdp2
NoNoJan 14, 2026
CVE-2026-22859MEDIUM5.6
  • Linux DebianLinux Debian
  • freerdp3
NoNoJan 14, 2026
CVE-2026-22858MEDIUM5.6
  • Linux DebianLinux Debian
  • freerdp3
NoNoJan 14, 2026
CVE-2026-22036LOW3.7
  • JavaScriptJavaScript
  • node-undici
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management