Lucene search

K
cve[email protected]CVE-2008-3573
HistoryAug 10, 2008 - 8:41 p.m.

CVE-2008-3573

2008-08-1020:41:00
CWE-189
CWE-264
web.nvd.nist.gov
19
cve-2008-3573
captcha
bypass vulnerability
pligg
php-nuke
security vulnerability

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

6.7 Medium

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

86.0%

The CAPTCHA implementation in (1) Pligg 9.9.5 and possibly (2) Francisco Burzi PHP-Nuke 8.1 provides a critical random number (the ts_random value) within the URL in the SRC attribute of an IMG element, which allows remote attackers to pass the CAPTCHA test via a calculation that combines this value with the current date and the HTTP User-Agent string.

Affected configurations

NVD
Node
php-nukephp-nukeMatch8.1
OR
pliggpliggMatch9.9.5

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

6.7 Medium

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

86.0%

Related for CVE-2008-3573