GHSA-vw39-2wj9-4q86

Suggest an improvement
Source
https://github.com/advisories/GHSA-vw39-2wj9-4q86
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-vw39-2wj9-4q86/GHSA-vw39-2wj9-4q86.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vw39-2wj9-4q86
Aliases
Published
2022-10-11T19:00:29Z
Modified
2024-09-16T22:22:39.923753Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
django-mfa2 vulnerable to MFA Replay attack
Details

mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay attack that could be used to register another device for a user. The device registration challenge is not invalidated after usage.

Database specific
{
    "nvd_published_at": "2022-10-11T14:15:00Z",
    "cwe_ids": [
        "CWE-294"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2022-10-11T20:49:45Z"
}
References

Affected packages

PyPI / django-mfa2

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.1

Affected versions

0.*

0.8
0.8.5
0.8.7
0.8.8
0.9.0
0.9.1
0.9.2
0.9.4
0.9.5

1.*

1.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.1
1.1.1
1.1.2
1.1.5
1.1.6
1.1.7
1.1.8
1.1.8.1
1.2.0
1.2.1
1.3.0
1.4.0
1.4.1
1.5.0
1.6
1.7.0
1.7.5
1.7.6
1.7.7
1.7.8
1.7.9
1.7.10
1.7.11
1.7.12
1.7.13
1.8.0
1.8.1
1.9.0

2.*

2.0.0
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5
2.0.6
2.1.0
2.1.2b1
2.1.2
2.2.0b1
2.2.0b2
2.2.0
2.3.0
2.4.0
2.5.0b1
2.5.0b2
2.5.0

PyPI / django-mfa2

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.0
Fixed
2.6.1

Affected versions

2.*

2.6.0