Lucene search

K
nvd[email protected]NVD:CVE-2023-45292
HistoryDec 11, 2023 - 10:15 p.m.

CVE-2023-45292

2023-12-1122:15:06
CWE-345
web.nvd.nist.gov
1
captcha
bypass
vulnerability
implementation

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

20.6%

When using the default implementation of Verify to check a Captcha, verification can be bypassed. For example, if the first parameter is a non-existent id, the second parameter is an empty string, and the third parameter is true, the function will always consider the Captcha to be correct.

Affected configurations

Nvd
Node
mojotvbase64captchaRange<1.3.6go
VendorProductVersionCPE
mojotvbase64captcha*cpe:2.3:a:mojotv:base64captcha:*:*:*:*:*:go:*:*

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

20.6%

Related for NVD:CVE-2023-45292