First published: Thu Feb 01 2007(Updated: )
The (1) Textimage 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal and the (2) Captcha 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal allow remote attackers to bypass the CAPTCHA test via an empty captcha element in $_SESSION.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal | =4.7 | |
Drupal | =4.7.1 | |
Drupal | =4.7.2 | |
Drupal | =4.7.3 | |
Drupal | =4.7.4 | |
Drupal | =4.7.5 | |
Drupal | =4.7.6 | |
Drupal | =4.7_rev1.15 | |
Drupal | =5.0 | |
Drupal | =5.1 | |
Drupal Textimage | =4.7 | |
Drupal Textimage | =5.0 |
http://cvs.drupal.org/viewcvs/drupal/contributions/modules/textimage/captcha.inc?r1=1.1&r2=1.1.2.1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0658 is considered a moderate severity vulnerability due to its potential for bypassing CAPTCHA.
To fix CVE-2007-0658, update the affected Textimage and Captcha modules to the latest versions.
CVE-2007-0658 affects Drupal versions 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1.
The primary impact of CVE-2007-0658 is that it allows remote attackers to bypass the CAPTCHA test.
No, CVE-2007-0658 is not a remote code execution vulnerability; it is related to bypassing CAPTCHA security.