MetInfo through 5.3.17 accepts the same CAPTCHA response for 120 seconds, which makes it easier for remote attackers to bypass intended challenge requirements by modifying the client-server data stream, as demonstrated by the login/findpass page.
References
Link | Resource |
---|---|
https://lncken.cn/?p=343 | Third Party Advisory |
https://lncken.cn/?p=343 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://lncken.cn/?p=343 - Third Party Advisory |
Information
Published : 2017-07-28 05:29
Updated : 2024-11-21 03:08
NVD link : CVE-2017-11717
Mitre link : CVE-2017-11717
CVE.ORG link : CVE-2017-11717
JSON object : View
Products Affected
metinfo_project
- metinfo
CWE
CWE-290
Authentication Bypass by Spoofing