Lucene search

K
cveGoCVE-2023-45292
HistoryDec 11, 2023 - 10:15 p.m.

CVE-2023-45292

2023-12-1122:15:06
CWE-345
Go
web.nvd.nist.gov
24
cve
2023
45292
captcha
verification
bypass
security
vulnerability
nvd

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

5.1

Confidence

High

EPSS

0.001

Percentile

20.6%

When using the default implementation of Verify to check a Captcha, verification can be bypassed. For example, if the first parameter is a non-existent id, the second parameter is an empty string, and the third parameter is true, the function will always consider the Captcha to be correct.

Affected configurations

Nvd
Node
mojotvbase64captchaRange<1.3.6go
VendorProductVersionCPE
mojotvbase64captcha*cpe:2.3:a:mojotv:base64captcha:*:*:*:*:*:go:*:*

CNA Affected

[
  {
    "vendor": "github.com/mojocn/base64Captcha",
    "product": "github.com/mojocn/base64Captcha",
    "collectionURL": "https://pkg.go.dev",
    "packageName": "github.com/mojocn/base64Captcha",
    "versions": [
      {
        "version": "0",
        "lessThan": "1.3.6",
        "status": "affected",
        "versionType": "semver"
      }
    ],
    "programRoutines": [
      {
        "name": "memoryStore.Verify"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

5.1

Confidence

High

EPSS

0.001

Percentile

20.6%