simple-php-captcha before commit 9d65a945029c7be7bb6bc893759e74c5636be694 allows remote attackers to automatically generate the captcha response by running the same code on the client-side.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2015/08/17/7 | Mailing List Third Party Advisory |
https://github.com/claviska/simple-php-captcha/commit/9d65a945029c7be7bb6bc893759e74c5636be694 | Patch Vendor Advisory |
https://github.com/claviska/simple-php-captcha/issues/16 | Issue Tracking Vendor Advisory |
http://www.openwall.com/lists/oss-security/2015/08/17/7 | Mailing List Third Party Advisory |
https://github.com/claviska/simple-php-captcha/commit/9d65a945029c7be7bb6bc893759e74c5636be694 | Patch Vendor Advisory |
https://github.com/claviska/simple-php-captcha/issues/16 | Issue Tracking Vendor Advisory |
Configurations
History
21 Nov 2024, 02:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2015/08/17/7 - Mailing List, Third Party Advisory | |
References | () https://github.com/claviska/simple-php-captcha/commit/9d65a945029c7be7bb6bc893759e74c5636be694 - Patch, Vendor Advisory | |
References | () https://github.com/claviska/simple-php-captcha/issues/16 - Issue Tracking, Vendor Advisory |
Information
Published : 2017-09-06 21:29
Updated : 2024-11-21 02:34
NVD link : CVE-2015-6250
Mitre link : CVE-2015-6250
CVE.ORG link : CVE-2015-6250
JSON object : View
Products Affected
simple-php-captcha_project
- simple-php-captcha
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor