The CAPTCHA implementation in (1) Pligg 9.9.5 and possibly (2) Francisco Burzi PHP-Nuke 8.1 provides a critical random number (the ts_random value) within the URL in the SRC attribute of an IMG element, which allows remote attackers to pass the CAPTCHA test via a calculation that combines this value with the current date and the HTTP User-Agent string.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/44192 | vdb entry |
http://www.rooksecurity.com/blog/?p=17 | exploit |
http://www.securityfocus.com/bid/30518 | vdb entry exploit |