Headline
CVE-2023-41100: Broken Access Control in extension "hCaptcha for EXT:form" (hcaptcha)
An issue was discovered in the hcaptcha (aka hCaptcha for EXT:form) extension before 2.1.2 for TYPO3. It fails to check that the required captcha field is submitted in the form data. allowing a remote user to bypass the CAPTCHA check.
Thu. 17th August, 2023
It has been discovered that the extension “hCaptcha for EXT:form” (hcaptcha) is susceptible to Broken Access Control.
- Release Date: August 17, 2023
- Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
- Component: “hCaptcha for EXT:form” (hcaptcha)
- Composer Package Name: waldhacker/hcaptcha
- Vulnerability Type: Broken Access Control
- Affected Versions: 2.1.1 and below
- Severity: Medium
- Suggested CVSS: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:F/RL:O/RC:C
- References: CVE-2023-41100, CWE-284, CWE-639
Problem Description
The extension fails to check the requirement of the captcha field in submitted form data allowing a remote user to bypass the captcha check.
Solution
An updated version 2.1.2 is available from the TYPO3 extension manager, packagist and at
https://extensions.typo3.org/extension/download/hcaptcha/2.1.2/zip
Users of the extension are advised to update the extension as soon as possible.
Credits
Thanks to Devid Messner for reporting the vulnerability and to Ralf Zimmermann for providing an updated version of the extension.
General Advice
Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.
Related news
An issue was discovered in the hcaptcha (aka hCaptcha for EXT:form) extension before 2.1.2 for TYPO3. It fails to check that the required captcha field is submitted in the form data. allowing a remote user to bypass the CAPTCHA check.