The CAPTCHA functionality in php-Nuke 6.0 through 7.9 uses fixed challenge/response pairs that only vary once per day based on the User Agent (HTTP_USER_AGENT), which allows remote attackers to bypass CAPTCHA controls by fixing the User Agent, performing a valid challenge/response, then replaying that pair in the random_num and gfx_check parameters.
2006-02-21T02:02:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | francisco_burzi | php-nuke | 6.0 | Yes |
Application | francisco_burzi | php-nuke | 6.5 | Yes |
Application | francisco_burzi | php-nuke | 6.5_beta1 | Yes |
Application | francisco_burzi | php-nuke | 6.5_final | Yes |
Application | francisco_burzi | php-nuke | 6.5_rc1 | Yes |
Application | francisco_burzi | php-nuke | 6.5_rc2 | Yes |
Application | francisco_burzi | php-nuke | 6.5_rc3 | Yes |
Application | francisco_burzi | php-nuke | 6.6 | Yes |
Application | francisco_burzi | php-nuke | 6.7 | Yes |
Application | francisco_burzi | php-nuke | 6.9 | Yes |
Application | francisco_burzi | php-nuke | 7.0 | Yes |
Application | francisco_burzi | php-nuke | 7.0_final | Yes |
Application | francisco_burzi | php-nuke | 7.1 | Yes |
Application | francisco_burzi | php-nuke | 7.2 | Yes |
Application | francisco_burzi | php-nuke | 7.3 | Yes |
Application | francisco_burzi | php-nuke | 7.4 | Yes |
Application | francisco_burzi | php-nuke | 7.5 | Yes |
Application | francisco_burzi | php-nuke | 7.6 | Yes |
Application | francisco_burzi | php-nuke | 7.7 | Yes |
Application | francisco_burzi | php-nuke | 7.8 | Yes |
Application | francisco_burzi | php-nuke | 7.9 | Yes |