mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay attack that could be used to register another device for a user. The device registration challenge is not invalidated after usage.
References
Link | Resource |
---|---|
https://github.com/mkalioby/django-mfa2/blob/0936ea253354dd95cb127f09d0efa31324caef27/mfa/FIDO2.py#L58 | Exploit Third Party Advisory |
https://github.com/mkalioby/django-mfa2/releases/tag/v2.5.1-release | Release Notes Third Party Advisory |
https://github.com/mkalioby/django-mfa2/releases/tag/v2.6.1-release | Release Notes Third Party Advisory |
https://github.com/mkalioby/django-mfa2/blob/0936ea253354dd95cb127f09d0efa31324caef27/mfa/FIDO2.py#L58 | Exploit Third Party Advisory |
https://github.com/mkalioby/django-mfa2/releases/tag/v2.5.1-release | Release Notes Third Party Advisory |
https://github.com/mkalioby/django-mfa2/releases/tag/v2.6.1-release | Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/mkalioby/django-mfa2/blob/0936ea253354dd95cb127f09d0efa31324caef27/mfa/FIDO2.py#L58 - Exploit, Third Party Advisory | |
References | () https://github.com/mkalioby/django-mfa2/releases/tag/v2.5.1-release - Release Notes, Third Party Advisory | |
References | () https://github.com/mkalioby/django-mfa2/releases/tag/v2.6.1-release - Release Notes, Third Party Advisory |
11 Oct 2022, 19:05
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-11 14:15
Updated : 2024-11-21 07:25
NVD link : CVE-2022-42731
Mitre link : CVE-2022-42731
CVE.ORG link : CVE-2022-42731
JSON object : View
Products Affected
django-mfa2_project
- django-mfa2
CWE
CWE-294
Authentication Bypass by Capture-replay