The CAPTCHA functionality in php-Nuke 6.0 up to and including 7.9 uses fixed challenge/response pairs that only vary once per day based on the User Agent (HTTP_USER_AGENT), which allows remote malicious users to bypass CAPTCHA controls by fixing the User Agent, performing a valid challenge/response, then replaying that pair in the random_num and gfx_check parameters.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
francisco burzi php-nuke 6.5_beta1 |
||
francisco burzi php-nuke 6.5_final |
||
francisco burzi php-nuke 7.0 |
||
francisco burzi php-nuke 7.0_final |
||
francisco burzi php-nuke 7.8 |
||
francisco burzi php-nuke 7.9 |
||
francisco burzi php-nuke 6.5_rc1 |
||
francisco burzi php-nuke 6.5_rc2 |
||
francisco burzi php-nuke 7.1 |
||
francisco burzi php-nuke 7.2 |
||
francisco burzi php-nuke 6.5_rc3 |
||
francisco burzi php-nuke 6.6 |
||
francisco burzi php-nuke 7.3 |
||
francisco burzi php-nuke 7.4 |
||
francisco burzi php-nuke 6.0 |
||
francisco burzi php-nuke 6.5 |
||
francisco burzi php-nuke 6.7 |
||
francisco burzi php-nuke 6.9 |
||
francisco burzi php-nuke 7.5 |
||
francisco burzi php-nuke 7.6 |
||
francisco burzi php-nuke 7.7 |