Описание
Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Vaultwarden versions 1.34.3 and prior are susceptible to a 2FA bypass when performing protected actions. An attacker who gains authenticated access to a user’s account can exploit this bypass to perform protected actions such as accessing the user’s API key or deleting the user’s vault and organisations the user is an admin/owner of . This issue has been patched in version 1.35.0.
A flaw was found in Vaultwarden. An authenticated attacker could bypass two-factor authentication (2FA) to perform sensitive actions. This bypass allows the attacker to access a user's API key or delete a user's vault and associated organizations where the user is an administrator or owner. This vulnerability could lead to unauthorized data manipulation and loss.
Отчет
This MODERATE vulnerability allows an authenticated attacker to bypass 2FA for protected actions via faulty rate limiting. Exploitation requires network access and low privileges (valid account). Impact includes high confidentiality loss (API key exposure), high integrity loss (vault/org deletion), and high availability loss (data destruction). Red Hat ships Vaultwarden in its community products.
Дополнительная информация
Статус:
EPSS
8.8 High
CVSS3
Связанные уязвимости
Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Vaultwarden versions 1.34.3 and prior are susceptible to a 2FA bypass when performing protected actions. An attacker who gains authenticated access to a user’s account can exploit this bypass to perform protected actions such as accessing the user’s API key or deleting the user’s vault and organisations the user is an admin/owner of . This issue has been patched in version 1.35.0.
Vaultwarden is an unofficial Bitwarden compatible server written in Ru ...
Vaultwarden has 2FA Bypass on Protected Actions due to Faulty Rate Limit Enforcement
EPSS
8.8 High
CVSS3