Description
The CAPTCHA implementation as used in (1) Francisco Burzi PHP-Nuke 7.0 and 8.1, (2) my123tkShop e-Commerce-Suite (aka 123tkShop) 0.9.1, (3) phpMyBitTorrent 1.2.2, (4) TorrentFlux 2.3, (5) e107 0.7.11, (6) WebZE 0.5.9, (7) Open Media Collectors Database (aka OpenDb) 1.5.0b4, and (8) Labgab 1.1 uses a code_bg.jpg background image and the PHP ImageString function in a way that produces an insufficient number of different images, which allows remote attackers to pass the CAPTCHA test via an automated attack using a table of all possible image checksums and their corresponding digit strings.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Subscriptions
E107
Subscribe
E107
Subscribe
Labgab
Subscribe
Labgab
Subscribe
My123tkshop
Subscribe
E-commerce-suite
Subscribe
Opendb
Subscribe
Opendb
Subscribe
Phpmybittorrent
Subscribe
Phpmybittorrent
Subscribe
Phpnuke
Subscribe
Php-nuke
Subscribe
Torrentflux Project
Subscribe
Torrentflux
Subscribe
Webze
Subscribe
Webze
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T08:41:00.253Z
Reserved: 2008-04-29T00:00:00.000Z
Link: CVE-2008-2020
No data.
Status : Deferred
Published: 2008-04-30T01:07:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-2020
No data.
OpenCVE Enrichment
No data.
Weaknesses