<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/MustLive Edition" -->
<rss version="2.0" 
	xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
	<title>Коментарі для запису: MoBiC-10 Bonus: another PHP-Nuke CAPTCHA bypass</title>
	<link>http://websecurity.com.ua/1528/</link>
	<description></description>
	<pubDate>Tue, 07 Apr 2026 16:27:45 +0000</pubDate>
	<generator>http://wordpress.org/?v=MustLive Edition</generator>

	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1528/#comment-225678</link>
		<pubDate>Wed, 05 Nov 2008 16:47:32 +0000</pubDate>
		<guid>http://websecurity.com.ua/1528/#comment-225678</guid>
					<description>&lt;strong&gt;ADEL&lt;/strong&gt;

Use exploit PHP-Nuke CAPTCHA bypass3.html which I published. Download it and setup it (e.g. set site's URL in source code).</description>
		<content:encoded><![CDATA[<p><strong>ADEL</strong></p>
<p>Use exploit PHP-Nuke CAPTCHA bypass3.html which I published. Download it and setup it (e.g. set site&#8217;s URL in source code).
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: ADEL</title>
		<link>http://websecurity.com.ua/1528/#comment-225643</link>
		<pubDate>Wed, 05 Nov 2008 13:39:12 +0000</pubDate>
		<guid>http://websecurity.com.ua/1528/#comment-225643</guid>
					<description>How Can I use it ?? help me  :?: :?: :?: :?:</description>
		<content:encoded><![CDATA[<p>How Can I use it ?? help me  <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_confused.gif' alt=':?' class='wp-smiley' /> : <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_confused.gif' alt=':?' class='wp-smiley' /> : <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_confused.gif' alt=':?' class='wp-smiley' /> : <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_confused.gif' alt=':?' class='wp-smiley' /> :
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1528/#comment-95608</link>
		<pubDate>Mon, 21 Jan 2008 21:38:14 +0000</pubDate>
		<guid>http://websecurity.com.ua/1528/#comment-95608</guid>
					<description>Tiggy, thanks for additional testing ;-).

&lt;blockquote&gt;I also removed the “Quake Fix” on my official site and tried the 4 exploits but they didn’t work; maybe my phph version there isn’t vulnerable … (running PN 7.8 I think).&lt;/blockquote&gt;
Man, as KrasivayaSvo wrote above, versions PHP-Nuke &#60; 7.9 are vulnerable. So it's interesting why exploits don't work at your site. But he tested at different PN versions except 7.8, so maybe this one is not vulnerable (or you have 7.9 or other version).

&lt;blockquote&gt;in 8.1 it will anyways.&lt;/blockquote&gt;
So for now we'll be recommending to use your solution (with putting $gfx_chk to global) to fix these Insufficient Anti-automation holes.</description>
		<content:encoded><![CDATA[<p>Tiggy, thanks for additional testing <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' /> .</p>
<blockquote><p>I also removed the “Quake Fix” on my official site and tried the 4 exploits but they didn’t work; maybe my phph version there isn’t vulnerable … (running PN 7.8 I think).</p></blockquote>
<p>Man, as KrasivayaSvo wrote above, versions PHP-Nuke &lt; 7.9 are vulnerable. So it&#8217;s interesting why exploits don&#8217;t work at your site. But he tested at different PN versions except 7.8, so maybe this one is not vulnerable (or you have 7.9 or other version).</p>
<blockquote><p>in 8.1 it will anyways.</p></blockquote>
<p>So for now we&#8217;ll be recommending to use your solution (with putting $gfx_chk to global) to fix these Insufficient Anti-automation holes.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: Tiggy</title>
		<link>http://websecurity.com.ua/1528/#comment-95588</link>
		<pubDate>Mon, 21 Jan 2008 16:53:10 +0000</pubDate>
		<guid>http://websecurity.com.ua/1528/#comment-95588</guid>
					<description>Hi all,

I finally did some more tries on my local server and without that $gfx_chk added a new user was created on the site; when I added it I got an error saying the security code isn't correct (normal coz it wasn't checked before).

I couldn't find that Quake thing thingy on my local 8.1 so I suppose it isn't there :p

I also removed the "Quake Fix" on my official site and tried the 4 exploits but they didn't work; maybe my phph version there isn't vulnerable ... (running PN 7.8 I think).

I would appreciate if others did try it out to see if adding gfx_chk to gloabls fixes the problem; but I think it will ... in 8.1 it will anyways :)</description>
		<content:encoded><![CDATA[<p>Hi all,</p>
<p>I finally did some more tries on my local server and without that $gfx_chk added a new user was created on the site; when I added it I got an error saying the security code isn&#8217;t correct (normal coz it wasn&#8217;t checked before).</p>
<p>I couldn&#8217;t find that Quake thing thingy on my local 8.1 so I suppose it isn&#8217;t there :p</p>
<p>I also removed the &#8220;Quake Fix&#8221; on my official site and tried the 4 exploits but they didn&#8217;t work; maybe my phph version there isn&#8217;t vulnerable &#8230; (running PN 7.8 I think).</p>
<p>I would appreciate if others did try it out to see if adding gfx_chk to gloabls fixes the problem; but I think it will &#8230; in 8.1 it will anyways <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' />
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1528/#comment-86984</link>
		<pubDate>Fri, 14 Dec 2007 23:30:04 +0000</pubDate>
		<guid>http://websecurity.com.ua/1528/#comment-86984</guid>
					<description>Tiggy, I asked you about that, because I had feelings that you have some others reasons (besides your trick) which prevent exploits from work.

Like I said before, KrasivayaSvo trick will not help with Insufficient Anti-automation hole, because referer checking can be bypassed. But this trick is anti CSRF filter, so it stop my PHP-Nuke exploits (all 3 exploits), because they not designed to bypass anti CSRF. You need to use exploit with bult-in anti CSRF bypassing to test at your sites.

&lt;blockquote&gt;I must say I get that “KrasivayaSvo warning (see code above)” on my official site and the local PN 8.1 site&lt;/blockquote&gt;
It's why you have this warning and why exploits don't work - because of anti CSRF filter. So you need to remove this anti CSRF code from your site (for example at localhost) to check my exploits or to make new exploit with anti CSRF bypassing function to check at your current sites.

I wrote many times at my site about such exploits. You need to use script languages to make such program (Perl, PHP or others) - you can use any of my perl exploits (with anti CSRF bypassing), which I published in MoBiC project, and make from it exploit for PHP-Nuke. To find out if your suggestion is working.</description>
		<content:encoded><![CDATA[<p>Tiggy, I asked you about that, because I had feelings that you have some others reasons (besides your trick) which prevent exploits from work.</p>
<p>Like I said before, KrasivayaSvo trick will not help with Insufficient Anti-automation hole, because referer checking can be bypassed. But this trick is anti CSRF filter, so it stop my PHP-Nuke exploits (all 3 exploits), because they not designed to bypass anti CSRF. You need to use exploit with bult-in anti CSRF bypassing to test at your sites.</p>
<blockquote><p>I must say I get that “KrasivayaSvo warning (see code above)” on my official site and the local PN 8.1 site</p></blockquote>
<p>It&#8217;s why you have this warning and why exploits don&#8217;t work - because of anti CSRF filter. So you need to remove this anti CSRF code from your site (for example at localhost) to check my exploits or to make new exploit with anti CSRF bypassing function to check at your current sites.</p>
<p>I wrote many times at my site about such exploits. You need to use script languages to make such program (Perl, PHP or others) - you can use any of my perl exploits (with anti CSRF bypassing), which I published in MoBiC project, and make from it exploit for PHP-Nuke. To find out if your suggestion is working.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: Tiggy</title>
		<link>http://websecurity.com.ua/1528/#comment-86981</link>
		<pubDate>Fri, 14 Dec 2007 22:31:19 +0000</pubDate>
		<guid>http://websecurity.com.ua/1528/#comment-86981</guid>
					<description>Hi again,

I tried all our exploits (this one and the two others) but no new user was created.

I must say I get that "KrasivayaSvo warning (see code above)" on my official site and the local PN 8.1 site, but I am pretty sure adding "$gfx_chk" to both functions solves that problem.

I found out that users could register even if "gfx_check" &#38; "random_num" were different while adding some mods to my site. After searching were the problem came from I found out "$gfx_chk" was empty (echoed all values) and that made me decide to add "$gfx_chk" to global for both functions. After that only "gfx_check = random_num" registrations seems to pass.

Hope someone with version without "KrasivayaSvo warning" can try it out (for example with same version of PN as for phpnuke.org)

Greetz</description>
		<content:encoded><![CDATA[<p>Hi again,</p>
<p>I tried all our exploits (this one and the two others) but no new user was created.</p>
<p>I must say I get that &#8220;KrasivayaSvo warning (see code above)&#8221; on my official site and the local PN 8.1 site, but I am pretty sure adding &#8220;$gfx_chk&#8221; to both functions solves that problem.</p>
<p>I found out that users could register even if &#8220;gfx_check&#8221; &amp; &#8220;random_num&#8221; were different while adding some mods to my site. After searching were the problem came from I found out &#8220;$gfx_chk&#8221; was empty (echoed all values) and that made me decide to add &#8220;$gfx_chk&#8221; to global for both functions. After that only &#8220;gfx_check = random_num&#8221; registrations seems to pass.</p>
<p>Hope someone with version without &#8220;KrasivayaSvo warning&#8221; can try it out (for example with same version of PN as for phpnuke.org)</p>
<p>Greetz
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1528/#comment-86909</link>
		<pubDate>Thu, 13 Dec 2007 22:43:39 +0000</pubDate>
		<guid>http://websecurity.com.ua/1528/#comment-86909</guid>
					<description>Tiggy, it's good that it works on your PN ;-).

Did you checked only on this exploit (MoBiC-10 Bonus) or on two others &lt;a href="/1527/" rel="nofollow"&gt;PHP-Nuke CAPTCHA bypass exploits&lt;/a&gt; (MoBiC-10) also? It's interesting to know if your patch fix one hole or both Insufficient Anti-automation holes.</description>
		<content:encoded><![CDATA[<p>Tiggy, it&#8217;s good that it works on your PN <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' /> .</p>
<p>Did you checked only on this exploit (MoBiC-10 Bonus) or on two others <a href="/1527/" rel="nofollow">PHP-Nuke CAPTCHA bypass exploits</a> (MoBiC-10) also? It&#8217;s interesting to know if your patch fix one hole or both Insufficient Anti-automation holes.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: Tiggy</title>
		<link>http://websecurity.com.ua/1528/#comment-86906</link>
		<pubDate>Thu, 13 Dec 2007 19:06:22 +0000</pubDate>
		<guid>http://websecurity.com.ua/1528/#comment-86906</guid>
					<description>Hi,

I just tried on my local PN 8.1 install which I patched and it didn't work anymore ... if others can confirm it solved the problem I think this is the bugfix :)

Greetz</description>
		<content:encoded><![CDATA[<p>Hi,</p>
<p>I just tried on my local PN 8.1 install which I patched and it didn&#8217;t work anymore &#8230; if others can confirm it solved the problem I think this is the bugfix <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>Greetz
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1528/#comment-86882</link>
		<pubDate>Thu, 13 Dec 2007 14:33:52 +0000</pubDate>
		<guid>http://websecurity.com.ua/1528/#comment-86882</guid>
					<description>&lt;strong&gt;Tiggy&lt;/strong&gt;

Thanks for your suggestion.

As I told KrasivayaSvo before, referer checking will not help with Insufficient Anti-automation hole, because this checking can be bypassed. Hope your sugestion will fix this vulnerability in PHP-Nuke.</description>
		<content:encoded><![CDATA[<p><strong>Tiggy</strong></p>
<p>Thanks for your suggestion.</p>
<p>As I told KrasivayaSvo before, referer checking will not help with Insufficient Anti-automation hole, because this checking can be bypassed. Hope your sugestion will fix this vulnerability in PHP-Nuke.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: Tiggy</title>
		<link>http://websecurity.com.ua/1528/#comment-86874</link>
		<pubDate>Thu, 13 Dec 2007 09:07:26 +0000</pubDate>
		<guid>http://websecurity.com.ua/1528/#comment-86874</guid>
					<description>I think I found an easier way to fix the problem :)

More info below:

QUOTE

Hi all,

There seems to be a bug in PhpNuke 8.1 ...

At the "New User" registration the "security code" seems not to be checked when registering ... entering wrong code doesn't affect anything ...

I could solve the problem by simple adding "$gfx_chk" at the end of the "global .... " line in "Modules/Your_Account/index.php" for function "confirmNewUser" &#38; "finishNewUser".

Hope this helps you guys out :)

/QUOTE</description>
		<content:encoded><![CDATA[<p>I think I found an easier way to fix the problem <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>More info below:</p>
<p>QUOTE</p>
<p>Hi all,</p>
<p>There seems to be a bug in PhpNuke 8.1 &#8230;</p>
<p>At the &#8220;New User&#8221; registration the &#8220;security code&#8221; seems not to be checked when registering &#8230; entering wrong code doesn&#8217;t affect anything &#8230;</p>
<p>I could solve the problem by simple adding &#8220;$gfx_chk&#8221; at the end of the &#8220;global &#8230;. &#8221; line in &#8220;Modules/Your_Account/index.php&#8221; for function &#8220;confirmNewUser&#8221; &amp; &#8220;finishNewUser&#8221;.</p>
<p>Hope this helps you guys out <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>/QUOTE
</p>
]]></content:encoded>
				</item>
</channel>
</rss>
