Vulnerability CVE-2023-45292


Published: 2023-12-11   Modified: 2023-12-14

Description:
When using the default implementation of Verify to check a Captcha, verification can be bypassed. For example, if the first parameter is a non-existent id, the second parameter is an empty string, and the third parameter is true, the function will always consider the Captcha to be correct.

Type:

CWE-345

(Insufficient Verification of Data Authenticity)

Affected software
Mojotv -> Base64captcha 

 References:
https://github.com/mojocn/base64Captcha/issues/120
https://github.com/mojocn/base64Captcha/commit/9b11012caca58925f1e47c770f79f2fa47e3ad13
https://github.com/mojocn/base64Captcha/commit/5ab86bd6f333aad3936f912fc52b411168dcd4a7
https://pkg.go.dev/vuln/GO-2023-2386

Copyright 2024, cxsecurity.com

 

Back to Top