ZZCMS 2023 contains a vulnerability in the captcha reuse logic located in /inc/function.php. The checkyzm function does not properly refresh the captcha value after a failed validation attempt. As a result, an attacker can exploit this flaw by repeatedly submitting the same incorrect captcha response, allowing them to capture the correct captcha value through error messages.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 04 Sep 2024 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Zzcms
Zzcms zzcms
Weaknesses CWE-287
CPEs cpe:2.3:a:zzcms:zzcms:*:*:*:*:*:*:*:*
Vendors & Products Zzcms
Zzcms zzcms
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
Description ZZCMS 2023 contains a vulnerability in the captcha reuse logic located in /inc/function.php. The checkyzm function does not properly refresh the captcha value after a failed validation attempt. As a result, an attacker can exploit this flaw by repeatedly submitting the same incorrect captcha response, allowing them to capture the correct captcha value through error messages.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-09-04T16:25:43.979Z

Reserved: 2024-08-21T00:00:00

Link: CVE-2024-44821

cve-icon Vulnrichment

Updated: 2024-09-04T16:25:32.058Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-04T16:15:07.320

Modified: 2025-04-23T15:01:50.647

Link: CVE-2024-44821

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.