Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9gjv-6qq6-v7qm

Опубликовано: 13 мар. 2020
Источник: github
Github: Прошло ревью
CVSS4: 6.2
CVSS3: 7.6

Описание

2FA bypass through deleting devices in wagtail-2fa

Impact

Any user with access to the CMS can view and delete other users' 2FA devices by going to the correct path. The user does not require special permissions in order to do so. By deleting the other user's device they can disable the target user's 2FA devices and potentially compromise the account if they figure out their password.

Patches

The problem has been patched in version 1.4.1.

Workarounds

There is no workaround for this issue.

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

wagtail-2fa

pip
Затронутые версииВерсия исправления

< 1.4.1

1.4.1

EPSS

Процентиль: 37%
0.00161
Низкий

6.2 Medium

CVSS4

7.6 High

CVSS3

Дефекты

CWE-285

Связанные уязвимости

CVSS3: 7.6
nvd
почти 6 лет назад

In wagtail-2fa before 1.4.1, any user with access to the CMS can view and delete other users 2FA devices by going to the correct path. The user does not require special permissions in order to do so. By deleting the other users device they can disable the target users 2FA devices and potentially compromise the account if they figure out their password. The problem has been patched in version 1.4.1.

EPSS

Процентиль: 37%
0.00161
Низкий

6.2 Medium

CVSS4

7.6 High

CVSS3

Дефекты

CWE-285