CVE-2021-37417
CAPTCHA bypass in login form via EXCLUDE_CAPTCHA parameter
5.3 (Medium)
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
ManageEngine ADSelfService Plus
< 6104
Krzysztof Andrusiak and Marcin Ogorzelski
Users can bypass captcha check in login form using EXCLUDE_CAPTCHA parameter, which could lead to brute-force attacks.
- Enable "Show CAPTCHA on Login Page every time" option in ADSSP settings.
- Set up intercepting proxy (e.g. Burp Suite).
- Go to login page, enter valid username and password. In CAPTCHA field enter any value.
- Intercept HTTP POST request sent to
/j_security_check
endpoint. AddEXCLUDE_CAPTCHA=true
parameter to request body. - Send modified request to the server. User will be logged in despite providing wrong CAPTCHA value.
- 17-03-2021 - Vulnerability reported to vendor
- 18-03-2021 - First response from vendor
- 08-05-2021 - Fixed version release
- 30-08-2021 - Public disclosure
- 21-02-2022 - PoC release