The CAPTCHA functionality in php-Nuke 6.0 through 7.9 uses fixed challenge/response pairs that only vary once per day based on the User Agent (HTTP_USER_AGENT), which allows remote attackers to bypass CAPTCHA controls by fixing the User Agent, performing a valid challenge/response, then replaying that pair in the random_num and gfx_check parameters.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Php-nuke | Francisco_burzi | 6.0 (including) | 6.0 (including) |
Php-nuke | Francisco_burzi | 6.5 (including) | 6.5 (including) |
Php-nuke | Francisco_burzi | 6.5_beta1 (including) | 6.5_beta1 (including) |
Php-nuke | Francisco_burzi | 6.5_final (including) | 6.5_final (including) |
Php-nuke | Francisco_burzi | 6.5_rc1 (including) | 6.5_rc1 (including) |
Php-nuke | Francisco_burzi | 6.5_rc2 (including) | 6.5_rc2 (including) |
Php-nuke | Francisco_burzi | 6.5_rc3 (including) | 6.5_rc3 (including) |
Php-nuke | Francisco_burzi | 6.6 (including) | 6.6 (including) |
Php-nuke | Francisco_burzi | 6.7 (including) | 6.7 (including) |
Php-nuke | Francisco_burzi | 6.9 (including) | 6.9 (including) |
Php-nuke | Francisco_burzi | 7.0 (including) | 7.0 (including) |
Php-nuke | Francisco_burzi | 7.0_final (including) | 7.0_final (including) |
Php-nuke | Francisco_burzi | 7.1 (including) | 7.1 (including) |
Php-nuke | Francisco_burzi | 7.2 (including) | 7.2 (including) |
Php-nuke | Francisco_burzi | 7.3 (including) | 7.3 (including) |
Php-nuke | Francisco_burzi | 7.4 (including) | 7.4 (including) |
Php-nuke | Francisco_burzi | 7.5 (including) | 7.5 (including) |
Php-nuke | Francisco_burzi | 7.6 (including) | 7.6 (including) |
Php-nuke | Francisco_burzi | 7.7 (including) | 7.7 (including) |
Php-nuke | Francisco_burzi | 7.8 (including) | 7.8 (including) |
Php-nuke | Francisco_burzi | 7.9 (including) | 7.9 (including) |