Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS12aG1qLTVxOXItbW05Z84AA9-2

BlastRADIUS also affects eduMFA

Summary

BlastRADIUS (see blastradius.fail for details) also affects eduMFA prior version 2.2.0, because the Message-Authenticator attributes were not checked.

Details

Website with the vulnerability information blastradius.fail
The original vulnerability has been assigned CVE-2024-3596
Case in vince: https://kb.cert.org/vuls/id/456537

PoC

There is no known proof-of-concept except for the attack shown in the paper from the researchers

Impact

An attacker can trigger an authentication flow with a RADIUS-backed token, intercept the RADIUS packet sent by eduMFA and modify the RADIUS server's answer, which would lead eduMFA to believe that the token is valid, even though the RADIUS servers answer was a reject.

Permalink: https://github.com/advisories/GHSA-vhmj-5q9r-mm9g
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12aG1qLTVxOXItbW05Z84AA9-2
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 4 months ago
Updated: 4 months ago


CVSS Score: 6.8
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

Identifiers: GHSA-vhmj-5q9r-mm9g
References: Repository: https://github.com/eduMFA/eduMFA
Blast Radius: 1.0

Affected Packages

pypi:edumfa
Dependent packages: 0
Dependent repositories: 0
Downloads: 902 last month
Affected Version Ranges: < 2.2.0
Fixed in: 2.2.0
All affected versions: 1.2.0, 1.3.0, 1.4.0, 1.5.0, 1.5.1, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.1.0
All unaffected versions: 2.2.0, 2.3.0