Files
CVEs-PoC/2016/CVE-2016-8600.md
T
2024-06-18 02:51:15 +02:00

19 lines
706 B
Markdown

### [CVE-2016-8600](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8600)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In dotCMS 3.2.1, attacker can load captcha once, fill it with correct value and then this correct value is ok for forms with captcha check later.
### POC
#### Reference
- http://seclists.org/fulldisclosure/2016/Oct/63
- https://security.elarlang.eu/cve-2016-8600-dotcms-captcha-bypass-by-reusing-valid-code.html
#### Github
No PoCs found on GitHub currently.