CVE-2008-2020
Severity CVSS v4.0:
Pending analysis
Type:
CWE-330
Use of Insufficiently Random Value
Publication date:
30/04/2008
Last modified:
09/04/2025
Description
The CAPTCHA implementation as used in (1) Francisco Burzi PHP-Nuke 7.0 and 8.1, (2) my123tkShop e-Commerce-Suite (aka 123tkShop) 0.9.1, (3) phpMyBitTorrent 1.2.2, (4) TorrentFlux 2.3, (5) e107 0.7.11, (6) WebZE 0.5.9, (7) Open Media Collectors Database (aka OpenDb) 1.5.0b4, and (8) Labgab 1.1 uses a code_bg.jpg background image and the PHP ImageString function in a way that produces an insufficient number of different images, which allows remote attackers to pass the CAPTCHA test via an automated attack using a table of all possible image checksums and their corresponding digit strings.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:e107:e107:0.7.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:labgab:labgab:1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:my123tkshop:e-commerce-suite:0.9.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:opendb:opendb:1.5.0:beta4:*:*:*:*:*:* | ||
cpe:2.3:a:phpmybittorrent:phpmybittorrent:1.2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:phpnuke:php-nuke:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:phpnuke:php-nuke:8.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:torrentflux_project:torrentflux:2.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:webze:webze:0.5.9:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://securityreason.com/securityalert/3834
- http://www.rooksecurity.com/blog/?p=6
- http://www.securityfocus.com/archive/1/491127/100/0/threaded
- http://www.securityfocus.com/bid/28877
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42152
- http://securityreason.com/securityalert/3834
- http://www.rooksecurity.com/blog/?p=6
- http://www.securityfocus.com/archive/1/491127/100/0/threaded
- http://www.securityfocus.com/bid/28877
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42152