Advertisement






WordPress Ajax BootModal Login 1.4.3 CAPTCHA Issue

CVE Category Price Severity
CVE-2018-15876 CWE-254 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2018-09-08
CPE
cpe:No specific CPE URI provided for this exploit
CVSS EPSS EPSSP
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N 0.0827 0.8747

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2018090074

Below is a copy:

WordPress Ajax BootModal Login 1.4.3 CAPTCHA Issue
About:
===========
Component: Ajax BootModal Login (Wordpress plugin)
Vulnerable version: 1.4.3 and possibly prior
CVE-ID: CVE-2018-15876
Author:
- LydA(c)ric Lefebvre (https://www.linkedin.com/in/lydericlefebvre)
- Fabien Haureils (https://www.linkedin.com/in/fabien-haureils/)

Timeline:
===========
- 2018/08/25: Vulnerability found
- 2018/08/25: Advisory published on GitHub
- 2018/08/25: CVE-ID request
- 2018/08/26: Reported to developer on GitHub
- 2018/09/01: No response from developer
- 2018/09/01: Advisory sent to bugtraq mailing list

Description:
===========
Register form, login form and password recovery form need CAPTCHA
solving to perform actions. However, these CAPTCHAs seem to be valid
as long as the user session is valid. One could send as many requests
as one wished by automatisation. This allows an attacker to spam large
number of mail addresses, and brute-force credentials.

References:
===========
https://github.com/aas-n/CVE/tree/master/CVE-2018-15876

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum