Vulnerability Name:

CVE-2007-0658 (CCN-31984)

Assigned:2007-01-31
Published:2007-01-31
Updated:2017-07-29
Summary:The (1) Textimage 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal and the (2) Captcha 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal allow remote attackers to bypass the CAPTCHA test via an empty captcha element in $_SESSION.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-Other
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2007-0658

Source: CONFIRM
Type: Patch
http://cvs.drupal.org/viewcvs/drupal/contributions/modules/captcha/captcha.module?r1=1.25.2.1&r2=1.25.2.2

Source: CONFIRM
Type: Patch
http://cvs.drupal.org/viewcvs/drupal/contributions/modules/textimage/captcha.inc?r1=1.1&r2=1.1.2.1

Source: CONFIRM
Type: Patch, Vendor Advisory
http://drupal.org/node/114364

Source: CCN
Type: DRUPAL-SA-2007-007
Textimage - response validation bypass

Source: CONFIRM
Type: Patch, Vendor Advisory
http://drupal.org/node/114519

Source: CCN
Type: Textimage Web site
Textimage | Drupal.org

Source: OSVDB
Type: UNKNOWN
32137

Source: OSVDB
Type: UNKNOWN
32138

Source: CCN
Type: SA23983
Drupal Captcha Module Security Bypass

Source: SECUNIA
Type: Patch, Vendor Advisory
23983

Source: CCN
Type: SA23985
Drupal Textimage Module Security Bypass

Source: SECUNIA
Type: Patch, Vendor Advisory
23985

Source: CCN
Type: OSVDB ID: 32137
Drupal Captcha Module $_SESSION Manipulation CAPTCHA Bypass

Source: CCN
Type: OSVDB ID: 32138
Drupal Textimage Module $_SESSION Manipulation CAPTCHA Bypass

Source: BID
Type: UNKNOWN
22329

Source: CCN
Type: BID-22329
Drupal CAPTCHA And TEXTIMAGE Bypass Weakness

Source: VUPEN
Type: UNKNOWN
ADV-2007-0431

Source: XF
Type: UNKNOWN
textimage-captcha-security-bypass(31984)

Source: XF
Type: UNKNOWN
textimage-captcha-security-bypass(31984)

Source: XF
Type: UNKNOWN
captcha-response-security-bypass(31994)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:drupal:drupal:4.7:*:*:*:*:*:*:*
  • OR cpe:/a:drupal:drupal:4.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:drupal:drupal:4.7.2:*:*:*:*:*:*:*
  • OR cpe:/a:drupal:drupal:4.7.3:*:*:*:*:*:*:*
  • OR cpe:/a:drupal:drupal:4.7.4:*:*:*:*:*:*:*
  • OR cpe:/a:drupal:drupal:4.7.5:*:*:*:*:*:*:*
  • OR cpe:/a:drupal:drupal:4.7.6:*:*:*:*:*:*:*
  • OR cpe:/a:drupal:drupal:4.7_rev1.15:*:*:*:*:*:*:*
  • OR cpe:/a:drupal:drupal:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:drupal:drupal:5.1:*:*:*:*:*:*:*
  • OR cpe:/a:drupal:textimage:4.7:*:*:*:*:*:*:*
  • OR cpe:/a:drupal:textimage:5.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2007-0658 (CCN-31994)

    Assigned:2007-01-30
    Published:2007-01-30
    Updated:2017-07-29
    Summary:The (1) Textimage 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal and the (2) Captcha 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal allow remote attackers to bypass the CAPTCHA test via an empty captcha element in $_SESSION.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): Low
    Availibility (A): None
    CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
    3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
    3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Type:CWE-Other
    Vulnerability Consequences:Bypass Security
    References:Source: MITRE
    Type: CNA
    CVE-2007-0658

    Source: CCN
    Type: DRUPAL-SA-2007-006
    Captcha - response validation bypass

    Source: CCN
    Type: Captcha Web site
    Captcha | drupal.org

    Source: CCN
    Type: SA23983
    Drupal Captcha Module Security Bypass

    Source: CCN
    Type: SA23985
    Drupal Textimage Module Security Bypass

    Source: CCN
    Type: OSVDB ID: 32137
    Drupal Captcha Module $_SESSION Manipulation CAPTCHA Bypass

    Source: CCN
    Type: OSVDB ID: 32138
    Drupal Textimage Module $_SESSION Manipulation CAPTCHA Bypass

    Source: CCN
    Type: BID-22329
    Drupal CAPTCHA And TEXTIMAGE Bypass Weakness

    Source: XF
    Type: UNKNOWN
    captcha-response-security-bypass(31994)

    BACK
    drupal drupal 4.7
    drupal drupal 4.7.1
    drupal drupal 4.7.2
    drupal drupal 4.7.3
    drupal drupal 4.7.4
    drupal drupal 4.7.5
    drupal drupal 4.7.6
    drupal drupal 4.7_rev1.15
    drupal drupal 5.0
    drupal drupal 5.1
    drupal textimage 4.7
    drupal textimage 5.0