mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay attack that could be used to register another device for a user. The device registration challenge is not invalidated after usage.
References
Link | Resource |
---|---|
https://github.com/mkalioby/django-mfa2/blob/0936ea253354dd95cb127f09d0efa31324caef27/mfa/FIDO2.py#L58 | Exploit Third Party Advisory |
https://github.com/mkalioby/django-mfa2/releases/tag/v2.5.1-release | Release Notes Third Party Advisory |
https://github.com/mkalioby/django-mfa2/releases/tag/v2.6.1-release | Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
11 Oct 2022, 19:05
Type | Values Removed | Values Added |
---|---|---|
First Time |
Django-mfa2 Project
Django-mfa2 Project django-mfa2 |
|
CPE | cpe:2.3:a:django-mfa2_project:django-mfa2:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-294 | |
References | (MISC) https://github.com/mkalioby/django-mfa2/blob/0936ea253354dd95cb127f09d0efa31324caef27/mfa/FIDO2.py#L58 - Exploit, Third Party Advisory | |
References | (MISC) https://github.com/mkalioby/django-mfa2/releases/tag/v2.5.1-release - Release Notes, Third Party Advisory | |
References | (MISC) https://github.com/mkalioby/django-mfa2/releases/tag/v2.6.1-release - Release Notes, Third Party Advisory |
11 Oct 2022, 15:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-11 14:15
Updated : 2023-12-10 14:35
NVD link : CVE-2022-42731
Mitre link : CVE-2022-42731
CVE.ORG link : CVE-2022-42731
JSON object : View
Products Affected
django-mfa2_project
- django-mfa2
CWE
CWE-294
Authentication Bypass by Capture-replay