[Security-news] reCAPTCHA v3 - Critical - Access bypass - SA-CONTRIB-2020-019
security-news at drupal.org
security-news at drupal.org
Wed May 13 17:13:10 UTC 2020
View online: https://www.drupal.org/sa-contrib-2020-019
Project: reCAPTCHA v3 [1]
Date: 2020-May-13
Security risk: *Critical* 18∕25
AC:None/A:None/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Access bypass
Description:
The reCaptcha v3 module enables you to protect your forms using the Google
reCaptcha V3.
If the reCaptcha v3 challenge succeeds, all the other form validations are
bypassed. This makes it possible for attackers to submit invalid or
incomplete forms.
This vulnerability only affects forms that are protected by reCaptcha v3 and
have server side validation steps (e.g required field or custom validation
functions).
Solution:
Install the latest version:
* If you use the reCAPTCHA v3 module for Drupal 8.x, upgrade to reCAPTCHA
v3
8.x-1.2 [3]
Also see the reCAPTCHA v3 [4] project page.
Reported By:
* arnaudvz [5]
* Martijn Vermeulen [6]
Fixed By:
* Denis V***** [7]
* Majid Ali Khan [8]
Coordinated By:
* Greg Knaddison [9] of the Drupal Security Team
[1] https://www.drupal.org/project/recaptcha_v3
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/recaptcha_v3/releases/8.x-1.2
[4] https://www.drupal.org/project/recaptcha_v3
[5] https://www.drupal.org/user/3628871
[6] https://www.drupal.org/user/960720
[7] https://www.drupal.org/user/896504
[8] https://www.drupal.org/user/1271330
[9] https://www.drupal.org/user/36762
More information about the Security-news
mailing list