CVE-2006-0805

The CAPTCHA functionality in php-Nuke 6.0 through 7.9 uses fixed challenge/response pairs that only vary once per day based on the User Agent (HTTP_USER_AGENT), which allows remote attackers to bypass CAPTCHA controls by fixing the User Agent, performing a valid challenge/response, then replaying that pair in the random_num and gfx_check parameters.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:francisco_burzi:php-nuke:6.5_beta1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_final:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.0_final:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.8:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.9:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc2:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.2:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc3:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.5:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.4:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.5:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.3:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.6:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.0:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:7.7:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.7:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.6:*:*:*:*:*:*:*
cpe:2.3:a:francisco_burzi:php-nuke:6.9:*:*:*:*:*:*:*

Information

Published : 2006-02-20 18:02

Updated : 2018-10-18 09:29


NVD link : CVE-2006-0805

Mitre link : CVE-2006-0805


JSON object : View

Advertisement

dedicated server usa

Products Affected

francisco_burzi

  • php-nuke