CVE-2006-0805

The CAPTCHA functionality in php-Nuke 6.0 through 7.9 uses fixed challenge/response pairs that only vary once per day based on the User Agent (HTTP_USER_AGENT), which allows remote attackers to bypass CAPTCHA controls by fixing the User Agent, performing a valid challenge/response, then replaying that pair in the random_num and gfx_check parameters.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:francisco_burzi:php-nuke:6.0:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_beta1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_final:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc2:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc3:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.6:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.7:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.9:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.0_final:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.2:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.3:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.4:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.5:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.6:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.7:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.8:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.9:*:*:*:*:*:*:*

History

21 Nov 2024, 00:07

Type Values Removed Values Added
References () http://secunia.com/advisories/18936 - () http://secunia.com/advisories/18936 -
References () http://securityreason.com/securityalert/455 - () http://securityreason.com/securityalert/455 -
References () http://www.securityfocus.com/archive/1/425394/100/0/threaded - () http://www.securityfocus.com/archive/1/425394/100/0/threaded -
References () http://www.securityfocus.com/bid/16722 - Exploit () http://www.securityfocus.com/bid/16722 - Exploit
References () http://www.waraxe.us/advisory-45.html - Exploit, Vendor Advisory () http://www.waraxe.us/advisory-45.html - Exploit, Vendor Advisory

Information

Published : 2006-02-21 02:02

Updated : 2024-11-21 00:07


NVD link : CVE-2006-0805

Mitre link : CVE-2006-0805

CVE.ORG link : CVE-2006-0805


JSON object : View

Products Affected

francisco_burzi

  • php-nuke