First published: Thu Feb 01 2007(Updated: )
The (1) Textimage 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal and the (2) Captcha 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal allow remote attackers to bypass the CAPTCHA test via an empty captcha element in $_SESSION.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal Drupal | =4.7.2 | |
Drupal Textimage | =4.7 | |
Drupal Drupal | =4.7.5 | |
Drupal Drupal | =4.7.3 | |
Drupal Drupal | =5.0 | |
Drupal Drupal | =4.7_rev1.15 | |
Drupal Drupal | =4.7 | |
Drupal Drupal | =4.7.6 | |
Drupal Drupal | =5.1 | |
Drupal Drupal | =4.7.4 | |
Drupal Drupal | =4.7.1 | |
Drupal Textimage | =5.0 |
http://cvs.drupal.org/viewcvs/drupal/contributions/modules/textimage/captcha.inc?r1=1.1&r2=1.1.2.1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.