TGCaptcha2 version 0.3.0 is vulnerable to a replay attack due to a missing nonce allowing attackers to use a single solved CAPTCHA multiple times.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1316083 | Issue Tracking Third Party Advisory VDB Entry |
https://patrick.uiterwijk.org/2016/03/09/fedora-spam-dwf-2016-89000/ | Technical Description Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1316083 | Issue Tracking Third Party Advisory VDB Entry |
https://patrick.uiterwijk.org/2016/03/09/fedora-spam-dwf-2016-89000/ | Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 02:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1316083 - Issue Tracking, Third Party Advisory, VDB Entry | |
References | () https://patrick.uiterwijk.org/2016/03/09/fedora-spam-dwf-2016-89000/ - Technical Description, Third Party Advisory |
Information
Published : 2016-10-25 14:29
Updated : 2024-11-21 02:42
NVD link : CVE-2016-1000032
Mitre link : CVE-2016-1000032
CVE.ORG link : CVE-2016-1000032
JSON object : View
Products Affected
python
- tgcaptcha2
CWE
CWE-284
Improper Access Control