The CAPTCHA functionality in php-Nuke 6.0 through 7.9 uses fixed challenge/response pairs that only vary once per day based on the User Agent (HTTP_USER_AGENT), which allows remote attackers to bypass CAPTCHA controls by fixing the User Agent, performing a valid challenge/response, then replaying that pair in the random_num and gfx_check parameters.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 7.5 | HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| CWE ID | Type | Source |
|---|---|---|
| NVD-CWE-Other | Primary | nvd@nist.gov |
| Hyperlink | Source | Resource |
|---|---|---|
| http://secunia.com/advisories/18936 | cve@mitre.org | N/A |
| http://securityreason.com/securityalert/455 | cve@mitre.org | N/A |
| http://www.securityfocus.com/archive/1/425394/100/0/threaded | cve@mitre.org | N/A |
| http://www.securityfocus.com/bid/16722 | cve@mitre.org | Exploit |
| http://www.waraxe.us/advisory-45.html | cve@mitre.org | Exploit Vendor Advisory |
| http://secunia.com/advisories/18936 | af854a3a-2127-422b-91ae-364da2661108 | N/A |
| http://securityreason.com/securityalert/455 | af854a3a-2127-422b-91ae-364da2661108 | N/A |
| http://www.securityfocus.com/archive/1/425394/100/0/threaded | af854a3a-2127-422b-91ae-364da2661108 | N/A |
| http://www.securityfocus.com/bid/16722 | af854a3a-2127-422b-91ae-364da2661108 | Exploit |
| http://www.waraxe.us/advisory-45.html | af854a3a-2127-422b-91ae-364da2661108 | Exploit Vendor Advisory |