Vulnerabilities > CVE-2016-8600 - 7PK - Security Features vulnerability in Dotcms 3.2.1
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
HIGH Availability impact
NONE Summary
In dotCMS 3.2.1, attacker can load captcha once, fill it with correct value and then this correct value is ok for forms with captcha check later.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
References
- http://seclists.org/fulldisclosure/2016/Oct/63
- http://seclists.org/fulldisclosure/2016/Oct/63
- http://www.securityfocus.com/bid/93798
- http://www.securityfocus.com/bid/93798
- https://github.com/dotCMS/core/issues/9330
- https://github.com/dotCMS/core/issues/9330
- https://security.elarlang.eu/cve-2016-8600-dotcms-captcha-bypass-by-reusing-valid-code.html
- https://security.elarlang.eu/cve-2016-8600-dotcms-captcha-bypass-by-reusing-valid-code.html