Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTg5cHgtd3czai1nMm1t

2FA bypass in Wagtail through new device path

2FA bypass through new device path

Impact

If someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS.

Patches

This problem has been patched in version 1.3.0.

Workarounds

There is no workaround at the moment.

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-89px-ww3j-g2mm
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTg5cHgtd3czai1nMm1t
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 4 years ago
Updated: over 1 year ago


CVSS Score: 8.7
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

Identifiers: GHSA-89px-ww3j-g2mm, CVE-2019-16766
References: Repository: https://github.com/labd/wagtail-2fa
Blast Radius: 9.4

Affected Packages

pypi:wagtail-2fa
Dependent packages: 0
Dependent repositories: 12
Downloads: 3,944 last month
Affected Version Ranges: < 1.3.0
Fixed in: 1.3.0
All affected versions: 0.0.1, 0.0.2, 0.0.3, 0.1.0, 1.0.0, 1.0.1, 1.1.0, 1.2.0
All unaffected versions: 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 1.4.0, 1.4.1, 1.4.2, 1.5.0, 1.6.0, 1.6.3, 1.6.5, 1.6.6, 1.6.7, 1.6.8, 1.6.9