Description
ZZCMS 2023 contains a vulnerability in the captcha reuse logic located in /inc/function.php. The checkyzm function does not properly refresh the captcha value after a failed validation attempt. As a result, an attacker can exploit this flaw by repeatedly submitting the same incorrect captcha response, allowing them to capture the correct captcha value through error messages.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Wed, 04 Sep 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zzcms
Zzcms zzcms |
|
| Weaknesses | CWE-287 | |
| CPEs | cpe:2.3:a:zzcms:zzcms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zzcms
Zzcms zzcms |
|
| Metrics |
cvssV3_1
|
Wed, 04 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ZZCMS 2023 contains a vulnerability in the captcha reuse logic located in /inc/function.php. The checkyzm function does not properly refresh the captcha value after a failed validation attempt. As a result, an attacker can exploit this flaw by repeatedly submitting the same incorrect captcha response, allowing them to capture the correct captcha value through error messages. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-04T16:25:43.979Z
Reserved: 2024-08-21T00:00:00.000Z
Link: CVE-2024-44821
Updated: 2024-09-04T16:25:32.058Z
Status : Analyzed
Published: 2024-09-04T16:15:07.320
Modified: 2025-04-23T15:01:50.647
Link: CVE-2024-44821
No data.
OpenCVE Enrichment
No data.
Weaknesses