CVE-2025-68113

MEDIUM
中文标题:
(暂无数据)
英文标题:
ALTCHA Proof-of-Work Vulnerable to Challenge Splicing and Replay
CVSS分数: 6.5
发布时间: 2025-12-16 00:53:59
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v2
漏洞描述
中文描述:

(暂无数据)

英文描述:

ALTCHA is privacy-first software for captcha and bot protection. A cryptographic semantic binding flaw in ALTCHA libraries allows challenge payload splicing, which may enable replay attacks. The HMAC signature does not unambiguously bind challenge parameters to the nonce, allowing an attacker to reinterpret a valid proof-of-work submission with a modified expiration value. This may allow previously solved challenges to be reused beyond their intended lifetime, depending on server-side replay handling and deployment assumptions. The vulnerability primarily impacts abuse-prevention mechanisms such as rate limiting and bot mitigation. It does not directly affect data confidentiality or integrity. This issue has been addressed by enforcing explicit semantic separation between challenge parameters and the nonce during HMAC computation. Users are advised to upgrade to patched versions, which include version 1.0.0 of the altcha Golang package, version 1.0.0 of the altcha Rubygem, version 1.0.0 of the altcha pip package, version 1.0.0 of the altcha Erlang package, version 1.4.1 of the altcha-lib npm package, version 1.3.1 of the altcha-org/altcha Composer package, and version 1.3.0 of the org.altcha:altcha Maven package. As a mitigation, implementations may append a delimiter to the end of the `salt` value prior to HMAC computation (for example, `<salt>?expires=<time>&`). This prevents ambiguity between parameters and the nonce and is backward-compatible with existing implementations, as the delimiter is treated as a standard URL parameter separator.

CWE类型:
CWE-347 CWE-115
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
altcha-org altcha-lib < 1.4.1 - - cpe:2.3:a:altcha-org:altcha-lib:<_1.4.1:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/altcha-org/altcha-lib/security/advisories/GHSA-6gvq-jcmp-8959 x_refsource_CONFIRM
cve.org
访问
https://github.com/altcha-org/altcha-lib-ex/commit/09b2bad466ad0338a5b24245380950ea9918333e x_refsource_MISC
cve.org
访问
https://github.com/altcha-org/altcha-lib-go/commit/4a5610745ef79895a67bac858b2e4f291c2614b8 x_refsource_MISC
cve.org
访问
https://github.com/altcha-org/altcha-lib-java/commit/69277651fdd6418ae10bf3a088901506f9c62114 x_refsource_MISC
cve.org
访问
https://github.com/altcha-org/altcha-lib-php/commit/9e9e70c864a9db960d071c77c778be0c9ff1a4d0 x_refsource_MISC
cve.org
访问
https://github.com/altcha-org/altcha-lib-rb/commit/4fd7b64cbbfc713f3ca4e066c2dd466e3b8d359b x_refsource_MISC
cve.org
访问
https://github.com/altcha-org/altcha-lib/commit/cb95d83a8d08e273b6be15e48988e7eaf60d5c08 x_refsource_MISC
cve.org
访问
https://github.com/altcha-org/altcha-lib-java/releases/tag/v1.3.0 x_refsource_MISC
cve.org
访问
https://github.com/altcha-org/altcha-lib-php/releases/tag/v1.3.1 x_refsource_MISC
cve.org
访问
https://github.com/altcha-org/altcha-lib/releases/tag/1.4.1 x_refsource_MISC
cve.org
访问
CVSS评分详情
3.1 (cna)
MEDIUM
6.5
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
机密性
NONE
完整性
LOW
可用性
LOW
时间信息
发布时间:
2025-12-16 00:53:59
修改时间:
2025-12-16 21:14:09
创建时间:
2026-01-12 02:12:28
更新时间:
2026-01-12 02:28:10
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-68113 2025-12-19 03:24:33 2026-01-12 02:12:28
NVD nvd_CVE-2025-68113 2025-12-17 03:00:07 2026-01-12 02:28:10
版本与语言
当前版本: v2
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
v2 NVD
2026-01-12 02:28:10
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']