First published: Wed Sep 04 2024(Updated: )
ZZCMS 2023 contains a vulnerability in the captcha reuse logic located in /inc/function.php. The checkyzm function does not properly refresh the captcha value after a failed validation attempt. As a result, an attacker can exploit this flaw by repeatedly submitting the same incorrect captcha response, allowing them to capture the correct captcha value through error messages.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ZZCMS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-44821 is classified as a moderate severity vulnerability due to its potential for exploitation via repeated captcha failures.
To fix CVE-2024-44821, implement a mechanism to refresh the captcha value upon each failed validation attempt.
CVE-2024-44821 affects ZZCMS 2023 specifically.
The impact of CVE-2024-44821 can allow attackers to bypass captcha protection by exploiting the captcha reuse flaw.
Yes, CVE-2024-44821 can be exploited remotely as it allows an attacker to repeatedly submit incorrect captcha responses.