Miggo Logo

CVE-2024-38873:
FriendlyCaptcha Plugin for TYPO3 Captcha Check Bypass

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.48332%
Published
6/21/2024
Updated
8/2/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
studiomitte/friendlycaptchacomposer< 0.1.40.1.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing captcha validation in form submissions. In TYPO3's form framework, custom validators like FriendlyCaptchaValidator are responsible for field validation. The description explicitly states the extension failed to check the captcha field requirement, which aligns with a missing validation check in the validator's validate() method. This is the standard implementation pattern for TYPO3 form validators, making this the most likely vulnerable component despite the absence of explicit code examples.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* w*s *is*ov*r** in t** *ri*n*ly**pt***_o**i*i*l (*k* Int**r*tion o* *ri*n*ly **pt***) *xt*nsion ***or* *.*.* *or TYPO*. T** *xt*nsion **ils to ****k t** r*quir*m*nt o* t** **pt*** *i*l* in su*mitt** *orm **t*, *llowin* * r*mot* us*r to *yp*ss

Reasoning

T** vuln*r**ility st*ms *rom missin* **pt*** v*li**tion in *orm su*missions. In TYPO*'s *orm *r*m*work, *ustom v*li**tors lik* `*ri*n*ly**pt***V*li**tor` *r* r*sponsi*l* *or *i*l* v*li**tion. T** **s*ription *xpli*itly st*t*s t** `*xt*nsion` **il** t