Show plain JSON{"id": "CVE-2008-3573", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2008-08-10T20:41:00.000", "references": [{"url": "http://www.rooksecurity.com/blog/?p=17", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/30518", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44192", "source": "cve@mitre.org"}, {"url": "http://www.rooksecurity.com/blog/?p=17", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/30518", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44192", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-189"}, {"lang": "en", "value": "CWE-264"}]}], "descriptions": [{"lang": "en", "value": "The CAPTCHA implementation in (1) Pligg 9.9.5 and possibly (2) Francisco Burzi PHP-Nuke 8.1 provides a critical random number (the ts_random value) within the URL in the SRC attribute of an IMG element, which allows remote attackers to pass the CAPTCHA test via a calculation that combines this value with the current date and the HTTP User-Agent string."}, {"lang": "es", "value": "La implementaci\u00f3n CAPTCHA en (1) Pligg 9.9.5 y posiblemente (2) Francisco Burzi PHP-Nuke 8.1, proporciona un n\u00famero aleatorio cr\u00edtico (el valor del ts_random) dentro de la URL en el traibuto SRC de un elemento IMG, lo que permite a atacantes remotos evitar el test CAPTCHA mediante un c\u00e1lculo que combina ese valor con la fecha actual y la cadena HTTP del User-Agent."}], "lastModified": "2024-11-21T00:49:34.647", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:php-nuke:php-nuke:8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA4AF173-293B-4867-9497-82C25AFA2A1E"}, {"criteria": "cpe:2.3:a:pligg:pligg:9.9.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29D1BF26-99D2-48F4-8B3C-7FAA2FB516EA"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}