5.3
CVE-2023-45292
- EPSS 0.08%
- Veröffentlicht 11.12.2023 22:15:06
- Zuletzt bearbeitet 21.11.2024 08:26:43
- Quelle security@golang.org
- CVE-Watchlists
- Unerledigt
When using the default implementation of Verify to check a Captcha, verification can be bypassed. For example, if the first parameter is a non-existent id, the second parameter is an empty string, and the third parameter is true, the function will always consider the Captcha to be correct.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Mojotv ≫ Base64captcha SwPlatformgo Version < 1.3.6
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.08% | 0.247 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
|
CWE-345 Insufficient Verification of Data Authenticity
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.