In wagtail-2fa before 1.4.1, any user with access to the CMS can view and delete other users 2FA devices by going to the correct path. The user does not require special permissions in order to do so. By deleting the other users device they can disable the target users 2FA devices and potentially compromise the account if they figure out their password. The problem has been patched in version 1.4.1.
References
Link | Resource |
---|---|
https://github.com/labd/wagtail-2fa/commit/ac23550d33b7436e90e3beea904647907eba5b74 | Patch Third Party Advisory |
https://github.com/labd/wagtail-2fa/security/advisories/GHSA-9gjv-6qq6-v7qm | Third Party Advisory |
https://github.com/labd/wagtail-2fa/commit/ac23550d33b7436e90e3beea904647907eba5b74 | Patch Third Party Advisory |
https://github.com/labd/wagtail-2fa/security/advisories/GHSA-9gjv-6qq6-v7qm | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:33
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.5
v3 : 7.6 |
References | () https://github.com/labd/wagtail-2fa/commit/ac23550d33b7436e90e3beea904647907eba5b74 - Patch, Third Party Advisory | |
References | () https://github.com/labd/wagtail-2fa/security/advisories/GHSA-9gjv-6qq6-v7qm - Third Party Advisory |
Information
Published : 2020-03-13 22:15
Updated : 2024-11-21 05:33
NVD link : CVE-2020-5240
Mitre link : CVE-2020-5240
CVE.ORG link : CVE-2020-5240
JSON object : View
Products Affected
labdigital
- wagtail-2fa