Vulnerability Details CVE-2006-0805
The CAPTCHA functionality in php-Nuke 6.0 through 7.9 uses fixed challenge/response pairs that only vary once per day based on the User Agent (HTTP_USER_AGENT), which allows remote attackers to bypass CAPTCHA controls by fixing the User Agent, performing a valid challenge/response, then replaying that pair in the random_num and gfx_check parameters.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.018
EPSS Ranking 81.8%
CVSS Severity
CVSS v2 Score 7.5
Products affected by CVE-2006-0805
-
cpe:2.3:a:francisco_burzi:php-nuke:6.0
-
cpe:2.3:a:francisco_burzi:php-nuke:6.5
-
cpe:2.3:a:francisco_burzi:php-nuke:6.5_beta1
-
cpe:2.3:a:francisco_burzi:php-nuke:6.5_final
-
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc1
-
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc2
-
cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc3
-
cpe:2.3:a:francisco_burzi:php-nuke:6.6
-
cpe:2.3:a:francisco_burzi:php-nuke:6.7
-
cpe:2.3:a:francisco_burzi:php-nuke:6.9
-
cpe:2.3:a:francisco_burzi:php-nuke:7.0
-
cpe:2.3:a:francisco_burzi:php-nuke:7.0_final
-
cpe:2.3:a:francisco_burzi:php-nuke:7.1
-
cpe:2.3:a:francisco_burzi:php-nuke:7.2
-
cpe:2.3:a:francisco_burzi:php-nuke:7.3
-
cpe:2.3:a:francisco_burzi:php-nuke:7.4
-
cpe:2.3:a:francisco_burzi:php-nuke:7.5
-
cpe:2.3:a:francisco_burzi:php-nuke:7.6
-
cpe:2.3:a:francisco_burzi:php-nuke:7.7
-
cpe:2.3:a:francisco_burzi:php-nuke:7.8
-
cpe:2.3:a:francisco_burzi:php-nuke:7.9