Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xcc3-mxq7-rg5h

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The sync endpoint in YubiKey Validation Server before 2.40 allows remote attackers to replay an OTP. NOTE: this issue is potentially relevant to persons outside Yubico who operate a self-hosted OTP validation service with a non-default configuration such as an open sync pool; the issue does NOT affect YubiCloud.

The sync endpoint in YubiKey Validation Server before 2.40 allows remote attackers to replay an OTP. NOTE: this issue is potentially relevant to persons outside Yubico who operate a self-hosted OTP validation service with a non-default configuration such as an open sync pool; the issue does NOT affect YubiCloud.

EPSS

Процентиль: 69%
0.00589
Низкий

Связанные уязвимости

CVSS3: 8.6
ubuntu
почти 6 лет назад

The sync endpoint in YubiKey Validation Server before 2.40 allows remote attackers to replay an OTP. NOTE: this issue is potentially relevant to persons outside Yubico who operate a self-hosted OTP validation service with a non-default configuration such as an open sync pool; the issue does NOT affect YubiCloud.

CVSS3: 8.6
nvd
почти 6 лет назад

The sync endpoint in YubiKey Validation Server before 2.40 allows remote attackers to replay an OTP. NOTE: this issue is potentially relevant to persons outside Yubico who operate a self-hosted OTP validation service with a non-default configuration such as an open sync pool; the issue does NOT affect YubiCloud.

CVSS3: 8.6
debian
почти 6 лет назад

The sync endpoint in YubiKey Validation Server before 2.40 allows remo ...

EPSS

Процентиль: 69%
0.00589
Низкий