First published: Tue Feb 21 2006(Updated: )
The CAPTCHA functionality in php-Nuke 6.0 through 7.9 uses fixed challenge/response pairs that only vary once per day based on the User Agent (HTTP_USER_AGENT), which allows remote attackers to bypass CAPTCHA controls by fixing the User Agent, performing a valid challenge/response, then replaying that pair in the random_num and gfx_check parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP-Nuke | =6.5_beta1 | |
PHP-Nuke | =6.5 | |
PHP-Nuke | =7.0 | |
PHP-Nuke | =7.4 | |
PHP-Nuke | =7.5 | |
PHP-Nuke | =7.2 | |
PHP-Nuke | =7.8 | |
PHP-Nuke | =7.0_final | |
PHP-Nuke | =6.5_rc2 | |
PHP-Nuke | =7.3 | |
PHP-Nuke | =6.5_rc3 | |
PHP-Nuke | =7.6 | |
PHP-Nuke | =7.9 | |
PHP-Nuke | =6.0 | |
PHP-Nuke | =7.7 | |
PHP-Nuke | =6.5_final | |
PHP-Nuke | =6.7 | |
PHP-Nuke | =6.6 | |
PHP-Nuke | =6.9 | |
PHP-Nuke | =7.1 | |
PHP-Nuke | =6.5_rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0805 is considered a high severity vulnerability due to its potential for allowing unauthorized access by bypassing CAPTCHA controls.
To fix CVE-2006-0805, it's recommended to update php-Nuke to the latest version that resolves this vulnerability.
CVE-2006-0805 affects php-Nuke versions from 6.0 to 7.9.
CVE-2006-0805 allows remote attackers to bypass CAPTCHA by replaying a valid challenge/response pair.
Yes, CVE-2006-0805 compromises the security of user authentication mechanisms by allowing CAPTCHA bypass.