Lucene search

K
githubGitHub Advisory DatabaseGHSA-5MMW-P5QV-W3X5
HistoryDec 12, 2023 - 12:30 a.m.

Always incorrect control flow in github.com/mojocn/base64Captcha

2023-12-1200:30:17
CWE-345
CWE-670
GitHub Advisory Database
github.com
6
github
mojocn
base64captcha
security
bypassed verification
software

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

20.6%

When using the default implementation of Verify to check a Captcha, verification can be bypassed. For example, if the first parameter is a non-existent id, the second parameter is an empty string, and the third parameter is true, the function will always consider the Captcha to be correct.

Affected configurations

Vulners
Node
mojocnbase64captchaRange<1.3.6
VendorProductVersionCPE
mojocnbase64captcha*cpe:2.3:a:mojocn:base64captcha:*:*:*:*:*:*:*:*

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

20.6%

Related for GHSA-5MMW-P5QV-W3X5