When a user is setting up two-factor authentication using an authenticator app, a QRcode is generated and made available via a GET request to /tf-qrcode. Since GETs do not have any CSRF protection, it is possible a malicious 3rd party could access the QRcode and therefore gain access to two-factor authentication codes. Note that the /tf-qrcode endpoint is ONLY accessible while the user is initially setting up their device. Once setup is complete, there is no vulnerability.
This is fixed in the upcoming 4.0.0 release.
You can provide your own URL for fetching the QRcode by defining SECURITYTWOFACTORQRCODEURL and providing your own implementation (that presumably required a POST with CSRF protection). This would require changing the two-factor setup template as well.
None.
If you have any questions or comments about this advisory: * Read this pull request: #423
{
"cwe_ids": [
"CWE-352"
],
"nvd_published_at": null,
"severity": "LOW",
"github_reviewed": true,
"github_reviewed_at": "2021-04-08T16:45:47Z"
}