Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

README Implementation is vulnerable to "replay"-style attack #40

Open
dgramop opened this issue Dec 27, 2019 · 0 comments
Open

README Implementation is vulnerable to "replay"-style attack #40

dgramop opened this issue Dec 27, 2019 · 0 comments

Comments

@dgramop
Copy link

dgramop commented Dec 27, 2019

Hello!

The README implementation may not provide the anti-bot guarantees necessary.

Someone who's writing a bot would only have to request one captcha and find its solution. Once the attacker finds the solution, so long as they never request another captcha, they can continuously send the same solution over and over. There is nothing to force the attacker to request a new captcha and regenerate the solution, especially if the attacker doesn't use a browser (and therefore doesn't automatically load the image)

I understand it's just README sample code, but I would recommend leaving a note on the README that suggests people don't blindly copy-and-paste and throw it into production.

A solution is could be as easy as invalidating the session once a user tries to answer/respond to the captcha

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

1 participant