Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1qbTM1LWg4cTItNzNtcM05RA
Improper one time password handling in devise-two-factor
Impact
As a result of an incomplete fix for CVE-2015-7225, in versions of devise-two-factor prior to 4.0.2 it is possible to reuse a One-Time-Password (OTP) for one (and only one) immediately trailing interval.
Patches
This vulnerability has been patched in version 4.0.2 which was released on March 24th, 2022. Individuals using this package are strongly encouraged to upgrade as soon as possible.
Credit for discovery
Benoit Côté-Jodoin
Michael Nipper - https://github.com/tinfoil/devise-two-factor/issues/106
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qbTM1LWg4cTItNzNtcM05RA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 3 years ago
Updated: over 1 year ago
CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS Percentage: 0.00063
EPSS Percentile: 0.2915
Identifiers: GHSA-jm35-h8q2-73mp, CVE-2021-43177
References:
- https://github.com/tinfoil/devise-two-factor/security/advisories/GHSA-jm35-h8q2-73mp
- https://github.com/tinfoil/devise-two-factor/issues/106
- https://nvd.nist.gov/vuln/detail/CVE-2021-43177
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/devise-two-factor/CVE-2021-43177.yml
- https://github.com/advisories/GHSA-jm35-h8q2-73mp
Blast Radius: 17.3
Affected Packages
rubygems:devise-two-factor
Dependent packages: 1Dependent repositories: 1,848
Downloads: 41,751,613 total
Affected Version Ranges: < 4.0.2
Fixed in: 4.0.2
All affected versions: 1.0.0, 1.0.1, 1.0.2, 1.1.0, 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.1.0, 4.0.0, 4.0.1
All unaffected versions: 4.0.2, 4.1.0, 4.1.1, 5.0.0, 5.1.0, 6.0.0, 6.1.0