← Voltar para CVEs
CVE-2016-8600
N/ADescricao
In dotCMS 3.2.1, attacker can load captcha once, fill it with correct value and then this correct value is ok for forms with captcha check later.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado10/28/2016
Ultima modificacao4/12/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
dotcms:dotcms
Fraquezas (CWE)
CWE-254CWE-264
Referencias
http://seclists.org/fulldisclosure/2016/Oct/63(cve@mitre.org)
http://www.securityfocus.com/bid/93798(cve@mitre.org)
https://github.com/dotCMS/core/issues/9330(cve@mitre.org)
https://security.elarlang.eu/cve-2016-8600-dotcms-captcha-bypass-by-reusing-valid-code.html(cve@mitre.org)
http://seclists.org/fulldisclosure/2016/Oct/63(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/93798(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/dotCMS/core/issues/9330(af854a3a-2127-422b-91ae-364da2661108)
https://security.elarlang.eu/cve-2016-8600-dotcms-captcha-bypass-by-reusing-valid-code.html(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.