Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTg5cHgtd3czai1nMm1t
2FA bypass in Wagtail through new device path
2FA bypass through new device path
Impact
If someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS.
Patches
This problem has been patched in version 1.3.0.
Workarounds
There is no workaround at the moment.
For more information
If you have any questions or comments about this advisory:
- Open an issue in github.com/labd/wagtail-2fa
- Email us at [email protected]
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTg5cHgtd3czai1nMm1t
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 5 years ago
Updated: about 2 months ago
CVSS Score: 8.7
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
EPSS Percentage: 0.00223
EPSS Percentile: 0.60184
Identifiers: GHSA-89px-ww3j-g2mm, CVE-2019-16766
References:
- https://github.com/labd/wagtail-2fa/security/advisories/GHSA-89px-ww3j-g2mm
- https://nvd.nist.gov/vuln/detail/CVE-2019-16766
- https://github.com/labd/wagtail-2fa/commit/13b12995d35b566df08a17257a23863ab6efb0ca
- https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81
- https://github.com/pypa/advisory-database/tree/main/vulns/wagtail-2fa/PYSEC-2019-135.yaml
- https://github.com/advisories/GHSA-89px-ww3j-g2mm
Blast Radius: 9.4
Affected Packages
pypi:wagtail-2fa
Dependent packages: 0Dependent repositories: 12
Downloads: 2,795 last month
Affected Version Ranges: < 1.3.0
Fixed in: 1.3.0
All affected versions: 0.0.1, 0.0.2, 0.0.3, 0.1.0, 1.0.0, 1.0.1, 1.1.0, 1.2.0
All unaffected versions: 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 1.4.0, 1.4.1, 1.4.2, 1.5.0, 1.6.0, 1.6.3, 1.6.5, 1.6.6, 1.6.7, 1.6.8, 1.6.9