First published: Sun May 16 2021(Updated: )
The SimpleCaptcha implementation in Liferay Portal 7.3.4, 7.3.5 and Liferay DXP 7.3 before fix pack 1 does not invalidate CAPTCHA answers after it is used, which allows remote attackers to repeatedly perform actions protected by a CAPTCHA challenge by reusing the same CAPTCHA answer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Liferay 7.4 GA | <7.3 | |
Liferay 7.4 GA | =7.3 | |
Liferay 7.4 GA | =7.3.4 | |
Liferay 7.4 GA | =7.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29047 is rated as a medium severity vulnerability due to its potential for abuse in bypassing CAPTCHA protections.
To fix CVE-2021-29047, upgrade to Liferay Portal 7.3.6 or later versions including Liferay DXP 7.3 with fix pack 1.
CVE-2021-29047 affects Liferay Portal versions 7.3.4 and 7.3.5, as well as Liferay DXP 7.3 prior to fix pack 1.
The impact of CVE-2021-29047 allows remote attackers to reuse CAPTCHA answers, enabling them to bypass security measures.
Yes, CVE-2021-29047 is remotely exploitable, allowing attackers to perform protected actions by reusing CAPTCHA responses.