Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1qbTM1LWg4cTItNzNtcM05RA

Improper one time password handling in devise-two-factor

Impact

As a result of an incomplete fix for CVE-2015-7225, in versions of devise-two-factor prior to 4.0.2 it is possible to reuse a One-Time-Password (OTP) for one (and only one) immediately trailing interval.

Patches

This vulnerability has been patched in version 4.0.2 which was released on March 24th, 2022. Individuals using this package are strongly encouraged to upgrade as soon as possible.

Credit for discovery

Benoit Côté-Jodoin
Michael Nipper - https://github.com/tinfoil/devise-two-factor/issues/106

Permalink: https://github.com/advisories/GHSA-jm35-h8q2-73mp
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qbTM1LWg4cTItNzNtcM05RA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: 12 months ago


CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Identifiers: GHSA-jm35-h8q2-73mp, CVE-2021-43177
References: Repository: https://github.com/tinfoil/devise-two-factor
Blast Radius: 17.3

Affected Packages

rubygems:devise-two-factor
Dependent packages: 1
Dependent repositories: 1,848
Downloads: 32,772,124 total
Affected Version Ranges: < 4.0.2
Fixed in: 4.0.2
All affected versions: 1.0.0, 1.0.1, 1.0.2, 1.1.0, 2.0.0, 2.0.1, 2.1.0, 2.2.0, 2.2.1, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.1.0, 4.0.0, 4.0.1
All unaffected versions: 4.0.2, 4.1.0, 4.1.1, 5.0.0