J-Security Center

Title: PHP-Nuke 'CAPTCHA' Registration Automation Multiple Security Bypass Weaknesses

Severity: MODERATE


PHP-Nuke is a web-based content manager implemented in PHP.

The application is prone to multiple security-bypass weaknesses because it fails to properly sanitize user-supplied input. The weaknesses occur in the 'CAPTCHA' process when registering users. Specifically, the application allows users to use the same 'gfx_check' and 'random_number' parameters or NULL characters when creating new users.

An attacker can exploit this issue by constructing a script that will register multiple users to the affected application. This may lead to other attacks.

These issues affect PHP-Nuke 8.1; other versions may also be affected.

Affected Products:

  • PHP-Nuke PHP-Nuke 7.0.0
  • PHP-Nuke PHP-Nuke 7.1.0
  • PHP-Nuke PHP-Nuke 7.2.0
  • PHP-Nuke PHP-Nuke 7.3.0
  • PHP-Nuke PHP-Nuke 7.4.0
  • PHP-Nuke PHP-Nuke 7.5.0
  • PHP-Nuke PHP-Nuke 7.6.0
  • PHP-Nuke PHP-Nuke 7.7.0
  • PHP-Nuke PHP-Nuke 7.8.0
  • PHP-Nuke PHP-Nuke 7.9.0
  • PHP-Nuke PHP-Nuke 8.0.0
  • PHP-Nuke PHP-Nuke 8.0.0 Final
  • PHP-Nuke PHP-Nuke 8.1


Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.