| शीर्षक | xxyopen novel-plus 5.1.3 Improper Restriction of Excessive Authentication Attempts |
|---|
| विवरण | The ajaxLogin method in the authentication module is vulnerable to a Captcha Replay Attack. The application correctly validates the user-submitted captcha against the one stored in the session but fails to invalidate or remove the captcha after its first use. This allows an attacker to reuse a single valid captcha indefinitely to perform automated brute-force or dictionary attacks against user passwords, completely bypassing the anti-automation security control. |
|---|
| स्रोत | ⚠️ https://blog.0xd00.com/blog/captcha-replay-attack-lead-to-brute-force-protection-bypass |
|---|
| उपयोगकर्ता | bpy9ft (UID 85221) |
|---|
| सबमिशन | 13/06/2025 07:52 AM (10 महीनों पहले) |
|---|
| संयम | 23/06/2025 04:32 PM (10 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 313652 [xxyopen/201206030 novel-plus तक 5.1.3 CATCHA LoginController.java ajaxLogin कमजोर प्रमाणीकरण] |
|---|
| अंक | 20 |
|---|