Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTlnanYtNnFxNi12N3Ft

2FA bypass through deleting devices in wagtail-2fa

Impact

Any user with access to the CMS can view and delete other users' 2FA devices by going to the correct path. The user does not require special permissions in order to do so. By deleting the other user's device they can disable the target user's 2FA devices and potentially compromise the account if they figure out their password.

Patches

The problem has been patched in version 1.4.1.

Workarounds

There is no workaround for this issue.

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-9gjv-6qq6-v7qm
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTlnanYtNnFxNi12N3Ft
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 4 years ago
Updated: over 1 year ago


CVSS Score: 7.6
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:N

Identifiers: GHSA-9gjv-6qq6-v7qm, CVE-2020-5240
References: Repository: https://github.com/labd/wagtail-2fa
Blast Radius: 8.2

Affected Packages

pypi:wagtail-2fa
Dependent packages: 0
Dependent repositories: 12
Downloads: 3,944 last month
Affected Version Ranges: < 1.4.1
Fixed in: 1.4.1
All affected versions: 0.0.1, 0.0.2, 0.0.3, 0.1.0, 1.0.0, 1.0.1, 1.1.0, 1.2.0, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 1.4.0
All unaffected versions: 1.4.1, 1.4.2, 1.5.0, 1.6.0, 1.6.3, 1.6.5, 1.6.6, 1.6.7, 1.6.8, 1.6.9