{ "id": "CVE-2008-2020", "sourceIdentifier": "cve@mitre.org", "published": "2008-04-30T01:07:00.000", "lastModified": "2018-10-11T20:38:49.687", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "The CAPTCHA implementation as used in (1) Francisco Burzi PHP-Nuke 7.0 and 8.1, (2) my123tkShop e-Commerce-Suite (aka 123tkShop) 0.9.1, (3) phpMyBitTorrent 1.2.2, (4) TorrentFlux 2.3, (5) e107 0.7.11, (6) WebZE 0.5.9, (7) Open Media Collectors Database (aka OpenDb) 1.5.0b4, and (8) Labgab 1.1 uses a code_bg.jpg background image and the PHP ImageString function in a way that produces an insufficient number of different images, which allows remote attackers to pass the CAPTCHA test via an automated attack using a table of all possible image checksums and their corresponding digit strings." }, { "lang": "es", "value": "La implementaci\u00f3n CAPTCHA como se utiliza en (1) Francisco Burzi PHP-Nuke 7.0 y 8.1, (2) my123tkShop e-Commerce-Suite (tambi\u00e9n conocido como 123tkShop) 0.9.1, (3) phpMyBitTorrent 1.2.2, (4) TorrentFlux 2.3, (5) e107 0.7.11, (6) WebZE 0.5.9, (7) Open Media Collectors Database (tambi\u00e9n conocido como OpenDb) 1.5.0b4, y (8) Labgab 1.1; utiliza una imagen de fondo code_bg.jpg y la funci\u00f3n de PHP ImageString de una forma que no produce un n\u00famero suficiente de im\u00e1genes diferentes; esto permite a atacantes remotos pasar el test CAPTCHA mediante un ataque autom\u00e1tico utilizando una tabla con todas las sumas de validaci\u00f3n (checksum) de im\u00e1genes posibles y sus cadenas de d\u00edgitos correspondientes." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-264" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:e107:e107:0.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "5C62F8AD-EA30-441E-B97F-EF8DE640DC1B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:labgab:labgab:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A3310461-272D-43C7-A8AA-589A7254FEF8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:my123tkshop:e-commerce-suite:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "ADC59E14-E4F7-4E9F-BE4E-98CD5797B45E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:opendb:opendb:1.5.0b4:*:*:*:*:*:*:*", "matchCriteriaId": "F1F70542-48CE-437E-BEA2-56E43D52DC22" }, { "vulnerable": true, "criteria": "cpe:2.3:a:php-nuke:php-nuke:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "DA4AF173-293B-4867-9497-82C25AFA2A1E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpmybittorrent:phpmybittorrent:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "20B593A2-9634-4AA0-8D63-CECA6391BEED" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpnuke:php-nuke:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5E8572B-43BE-4068-929F-2B6FAA9EF959" }, { "vulnerable": true, "criteria": "cpe:2.3:a:torrentflux:torrentflux:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "9FF1CC35-4592-4B8B-B023-D0C5DA7B1CF5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:webze:webze:0.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "2AA1E599-AC63-40AA-A3B9-6585CDABFFE1" } ] } ] } ], "references": [ { "url": "http://securityreason.com/securityalert/3834", "source": "cve@mitre.org" }, { "url": "http://www.rooksecurity.com/blog/?p=6", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/archive/1/491127/100/0/threaded", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/28877", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42152", "source": "cve@mitre.org" } ] }