CVE-2016-8600

In dotCMS 3.2.1, attacker can load captcha once, fill it with correct value and then this correct value is ok for forms with captcha check later.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dotcms:dotcms:3.2.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:59

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2016/Oct/63 - Exploit, Third Party Advisory, VDB Entry () http://seclists.org/fulldisclosure/2016/Oct/63 - Exploit, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/93798 - () http://www.securityfocus.com/bid/93798 -
References () https://github.com/dotCMS/core/issues/9330 - Vendor Advisory () https://github.com/dotCMS/core/issues/9330 - Vendor Advisory
References () https://security.elarlang.eu/cve-2016-8600-dotcms-captcha-bypass-by-reusing-valid-code.html - Exploit, Third Party Advisory () https://security.elarlang.eu/cve-2016-8600-dotcms-captcha-bypass-by-reusing-valid-code.html - Exploit, Third Party Advisory

Information

Published : 2016-10-28 15:59

Updated : 2024-11-21 02:59


NVD link : CVE-2016-8600

Mitre link : CVE-2016-8600

CVE.ORG link : CVE-2016-8600


JSON object : View

Products Affected

dotcms

  • dotcms
CWE
CWE-254

7PK - Security Features

CWE-264

Permissions, Privileges, and Access Controls