The (1) Textimage 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal and the (2) Captcha 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal allow remote attackers to bypass the CAPTCHA test via an empty captcha element in $_SESSION.
Link | Tags |
---|---|
http://cvs.drupal.org/viewcvs/drupal/contributions/modules/textimage/captcha.inc?r1=1.1&r2=1.1.2.1 | patch |
http://osvdb.org/32137 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/31994 | vdb entry |
http://secunia.com/advisories/23983 | third party advisory patch vendor advisory |
http://drupal.org/node/114519 | patch vendor advisory |
http://secunia.com/advisories/23985 | third party advisory patch vendor advisory |
http://drupal.org/node/114364 | patch vendor advisory |
http://www.securityfocus.com/bid/22329 | vdb entry |
http://www.vupen.com/english/advisories/2007/0431 | vdb entry |
http://osvdb.org/32138 | vdb entry |
http://cvs.drupal.org/viewcvs/drupal/contributions/modules/captcha/captcha.module?r1=1.25.2.1&r2=1.25.2.2 | patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/31984 | vdb entry |