Research & Development
$ #

CVE-2021-37417

CAPTCHA bypass in login form via EXCLUDE_CAPTCHA parameter

5.3 (Medium)

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

ManageEngine ADSelfService Plus

< 6104

Krzysztof Andrusiak and Marcin Ogorzelski

Users can bypass captcha check in login form using EXCLUDE_CAPTCHA parameter, which could lead to brute-force attacks.

  1. Enable "Show CAPTCHA on Login Page every time" option in ADSSP settings.
  2. Set up intercepting proxy (e.g. Burp Suite).
  3. Go to login page, enter valid username and password. In CAPTCHA field enter any value.
  4. Intercept HTTP POST request sent to /j_security_check endpoint. Add EXCLUDE_CAPTCHA=true parameter to request body.
  5. Send modified request to the server. User will be logged in despite providing wrong CAPTCHA value.
  • 17-03-2021 - Vulnerability reported to vendor
  • 18-03-2021 - First response from vendor
  • 08-05-2021 - Fixed version release
  • 30-08-2021 - Public disclosure
  • 21-02-2022 - PoC release