Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-89px-ww3j-g2mm

Опубликовано: 29 нояб. 2019
Источник: github
Github: Прошло ревью
CVSS4: 6.3
CVSS3: 8.7

Описание

2FA bypass in Wagtail through new device path

2FA bypass through new device path

Impact

If someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS.

Patches

This problem has been patched in version 1.3.0.

Workarounds

There is no workaround at the moment.

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

wagtail-2fa

pip
Затронутые версииВерсия исправления

< 1.3.0

1.3.0

EPSS

Процентиль: 38%
0.0017
Низкий

6.3 Medium

CVSS4

8.7 High

CVSS3

Дефекты

CWE-290
CWE-304

Связанные уязвимости

CVSS3: 8.7
nvd
около 6 лет назад

When using wagtail-2fa before 1.3.0, if someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS. This problem has been patched in version 1.3.0.

EPSS

Процентиль: 38%
0.0017
Низкий

6.3 Medium

CVSS4

8.7 High

CVSS3

Дефекты

CWE-290
CWE-304