[Security-news] reCAPTCHA v3 - Critical - Access bypass - SA-CONTRIB-2020-019

security-news at drupal.org security-news at drupal.org
Wed May 13 17:13:10 UTC 2020


View online: https://www.drupal.org/sa-contrib-2020-019

Project: reCAPTCHA v3 [1]
Date: 2020-May-13
Security risk: *Critical* 18∕25
AC:None/A:None/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Access bypass

Description: 
The reCaptcha v3 module enables you to protect your forms using the Google
reCaptcha V3.

If the reCaptcha v3 challenge succeeds, all the other form validations are
bypassed. This makes it possible for attackers to submit invalid or
incomplete forms.

This vulnerability only affects forms that are protected by reCaptcha v3 and
have server side validation steps (e.g required field or custom validation
functions).

Solution: 
Install the latest version:

   * If you use the reCAPTCHA v3 module for Drupal 8.x, upgrade to reCAPTCHA 
v3
     8.x-1.2 [3]

Also see the reCAPTCHA v3 [4] project page.

Reported By: 
   * arnaudvz  [5]
   * Martijn Vermeulen [6]

Fixed By: 
   * Denis V*****  [7]
   * Majid Ali Khan  [8]

Coordinated By: 
   * Greg Knaddison [9] of the Drupal Security Team


[1] https://www.drupal.org/project/recaptcha_v3
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/recaptcha_v3/releases/8.x-1.2
[4] https://www.drupal.org/project/recaptcha_v3
[5] https://www.drupal.org/user/3628871
[6] https://www.drupal.org/user/960720
[7] https://www.drupal.org/user/896504
[8] https://www.drupal.org/user/1271330
[9] https://www.drupal.org/user/36762



More information about the Security-news mailing list