Support for Drupal 7 is ending on 5 January 2025—it’s time to migrate to Drupal 10! Learn about the many benefits of Drupal 10 and find migration tools in our resource center.
By Heine on
- Advisory ID: DRUPAL-SA-2007-007
- Project: Textimage (third-party module)
- Version: 4.7.x, 5.x
- Date: 2007-Jan-31
- Security risk: Less critical
- Exploitable from: Remote
- Vulnerability: Captcha bypass
Description
Captcha validation by Textimage can be bypassed by manipulating request variables while posting. This defeats the purpose of the captcha and makes automated submission possible.
Versions affected
- All versions of Textimage 4.7.x prior to Textimage 4.7-1.2.
- All versions of Textimage 5.x prior to Textimage 5.x-1.1.
Drupal core is not affected. If you do not use the contributed Captcha module, there is nothing you need to do.
Solution
Install the latest version:
- If you use Drupal 4.7.x use Textimage 4.7.x-1.2.
- If you use Drupal 5.x use Textimage 5.x-1.1.
See also the Textimage project page.
Reported by
Thomas Nilsson.
Contact
The security contact for Drupal can be reached at security at drupal.org or via the form at http://drupal.org/contact.