ZZCMS 2023 contains a vulnerability in the captcha reuse logic located in /inc/function.php. The checkyzm function does not properly refresh the captcha value after a failed validation attempt. As a result, an attacker can exploit this flaw by repeatedly submitting the same incorrect captcha response, allowing them to capture the correct captcha value through error messages.
References
Link | Resource |
---|---|
https://github.com/gkdgkd123/codeAudit/blob/main/CVE-2024-44821%20ZZCMS2023%20%E9%AA%8C%E8%AF%81%E7%A0%81%E5%A4%8D%E7%94%A8%E9%80%BB%E8%BE%91%E6%BC%8F%E6%B4%9E.md | Broken Link Exploit Third Party Advisory |
Configurations
History
23 Apr 2025, 15:01
Type | Values Removed | Values Added |
---|---|---|
First Time |
Zzcms
Zzcms zzcms |
|
References | () https://github.com/gkdgkd123/codeAudit/blob/main/CVE-2024-44821%20ZZCMS2023%20%E9%AA%8C%E8%AF%81%E7%A0%81%E5%A4%8D%E7%94%A8%E9%80%BB%E8%BE%91%E6%BC%8F%E6%B4%9E.md - Broken Link, Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:zzcms:zzcms:*:*:*:*:*:*:*:* |
05 Sep 2024, 12:53
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Sep 2024, 17:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CWE | CWE-287 |
04 Sep 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-04 16:15
Updated : 2025-04-23 15:01
NVD link : CVE-2024-44821
Mitre link : CVE-2024-44821
CVE.ORG link : CVE-2024-44821
JSON object : View
Products Affected
zzcms
- zzcms
CWE
CWE-287
Improper Authentication