Total vulnerabilities in the database
The CAPTCHA functionality in php-Nuke 6.0 through 7.9 uses fixed challenge/response pairs that only vary once per day based on the User Agent (HTTP_USER_AGENT), which allows remote attackers to bypass CAPTCHA controls by fixing the User Agent, performing a valid challenge/response, then replaying that pair in the random_num and gfx_check parameters.
Software | From | Fixed in |
---|---|---|
francisco_burzi / php-nuke | 6.5_beta1 | 6.5_beta1.x |
francisco_burzi / php-nuke | 6.5 | 6.5.x |
francisco_burzi / php-nuke | 7.0 | 7.0.x |
francisco_burzi / php-nuke | 7.4 | 7.4.x |
francisco_burzi / php-nuke | 7.5 | 7.5.x |
francisco_burzi / php-nuke | 7.2 | 7.2.x |
francisco_burzi / php-nuke | 7.8 | 7.8.x |
francisco_burzi / php-nuke | 7.0_final | 7.0_final.x |
francisco_burzi / php-nuke | 6.5_rc2 | 6.5_rc2.x |
francisco_burzi / php-nuke | 7.3 | 7.3.x |
francisco_burzi / php-nuke | 6.5_rc3 | 6.5_rc3.x |
francisco_burzi / php-nuke | 7.6 | 7.6.x |
francisco_burzi / php-nuke | 7.9 | 7.9.x |
francisco_burzi / php-nuke | 6.0 | 6.0.x |
francisco_burzi / php-nuke | 7.7 | 7.7.x |
francisco_burzi / php-nuke | 6.5_final | 6.5_final.x |
francisco_burzi / php-nuke | 6.7 | 6.7.x |
francisco_burzi / php-nuke | 6.6 | 6.6.x |
francisco_burzi / php-nuke | 6.9 | 6.9.x |
francisco_burzi / php-nuke | 7.1 | 7.1.x |
francisco_burzi / php-nuke | 6.5_rc1 | 6.5_rc1.x |