{"id":"CVE-2021-29047","details":"The SimpleCaptcha implementation in Liferay Portal 7.3.4, 7.3.5 and Liferay DXP 7.3 before fix pack 1 does not invalidate CAPTCHA answers after it is used, which allows remote attackers to repeatedly perform actions protected by a CAPTCHA challenge by reusing the same CAPTCHA answer.","aliases":["GHSA-9mxg-p873-6793"],"modified":"2026-04-10T04:31:53.526684Z","published":"2021-05-16T16:15:07.297Z","references":[{"type":"ADVISORY","url":"http://liferay.com"},{"type":"ADVISORY","url":"https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/120743467"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/liferay/liferay-portal","events":[{"introduced":"0"},{"last_affected":"6d28f4266948e7b0eeb14c3e8d16b3d81e02e8bb"},{"introduced":"0"},{"last_affected":"f193301b2848899b008d51513af62a3b3a9b7888"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.3.4"},{"introduced":"0"},{"last_affected":"7.3.5"}]}}],"versions":["6.1.0-b1","6.1.0-b2","6.1.0-b3","6.1.0-b4","6.1.0-rc1","6.2.0-b1","6.2.0-b2","6.2.0-m2","6.2.0-m3","6.2.0-m4","6.2.0-m5","6.2.0-m6","7.0.0-m1","7.0.0-m2","7.0.0-m3","7.0.0-m4","7.0.0-m5","7.1.0-a1","7.1.0-a2","7.1.0-b1","7.1.0-b2","7.1.0-m1","7.1.0-m2","7.2.0-a1","7.2.0-b1","7.2.0-b2","7.2.0-b3","7.2.0-m2","7.3.0-ga1","7.3.1-ga2","7.3.2-ga3","7.3.3-ga4","7.3.4-ga5","7.3.5-ga6","sync-3.0.0-b1","sync-3.0.1-b2","sync-3.0.10-ga2","sync-3.0.2-b3","sync-3.0.3-b4","sync-3.0.4-b5","sync-3.0.5-b6","sync-3.0.6-b7","sync-3.0.7-b8","sync-3.0.8-b9","sync-3.0.9-ga1","sync-3.1.0-ga1","test-fix-pack-base-7310"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-29047.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3-NA"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}