Potential Captcha Validate Bypass in flask-session-captcha
Moderate severity
GitHub Reviewed
Published
Apr 24, 2022
in
Tethik/flask-session-captcha
•
Updated Sep 20, 2024
Description
Published by the National Vulnerability Database
Apr 25, 2022
Published to the GitHub Advisory Database
Apr 26, 2022
Reviewed
Apr 26, 2022
Last updated
Sep 20, 2024
Impact
flask-session-captcha is a package which allows users to extend Flask by adding an image based captcha stored in a server side session.
The
captcha.validate()
function would returnNone
if passed no value (e.g. by submitting a request with an empty form).If implementing users were checking the return value to be False, the captcha verification check could be bypassed.
Sample vulnerable code:
Patches
A new version (1.2.1) is available that fixes the issue.
Workarounds
Users can workaround the issue by not explicitly checking that the value is False.
Checking the return value less explicitly should still work.
References
Tethik/flask-session-captcha#27
For more information
If you have any questions or comments about this advisory:
References