Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-7225

Опубликовано: 06 сент. 2017
Источник: debian

Описание

Tinfoil Devise-two-factor before 2.0.0 does not strictly follow section 5.2 of RFC 6238 and does not "burn" a successfully validated one-time password (aka OTP), which allows remote or physically proximate attackers with a target user's login credentials to log in as said user by obtaining the OTP through performing a man-in-the-middle attack between the provider and verifier, or shoulder surfing, and replaying the OTP in the current time-step.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-devise-two-factorfixed2.0.0-1package

Примечания

  • https://www.openwall.com/lists/oss-security/2015/09/06/2

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 8 лет назад

Tinfoil Devise-two-factor before 2.0.0 does not strictly follow section 5.2 of RFC 6238 and does not "burn" a successfully validated one-time password (aka OTP), which allows remote or physically proximate attackers with a target user's login credentials to log in as said user by obtaining the OTP through performing a man-in-the-middle attack between the provider and verifier, or shoulder surfing, and replaying the OTP in the current time-step.

CVSS3: 5.3
nvd
больше 8 лет назад

Tinfoil Devise-two-factor before 2.0.0 does not strictly follow section 5.2 of RFC 6238 and does not "burn" a successfully validated one-time password (aka OTP), which allows remote or physically proximate attackers with a target user's login credentials to log in as said user by obtaining the OTP through performing a man-in-the-middle attack between the provider and verifier, or shoulder surfing, and replaying the OTP in the current time-step.

CVSS3: 5.3
github
больше 7 лет назад

Tinfoil Devise-two-factor does not "burn" a successfully validated one-time password (OTP)