mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay attack that could be used to register another device for a user. The device registration challenge is not invalidated after usage.
References
Link | Resource |
---|---|
https://github.com/mkalioby/django-mfa2/blob/0936ea253354dd95cb127f09d0efa31324caef27/mfa/FIDO2.py#L58 | Exploit Third Party Advisory |
https://github.com/mkalioby/django-mfa2/releases/tag/v2.5.1-release | Release Notes Third Party Advisory |
https://github.com/mkalioby/django-mfa2/releases/tag/v2.6.1-release | Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-10-11 14:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-42731
Mitre link : CVE-2022-42731
CVE.ORG link : CVE-2022-42731
JSON object : View
Products Affected
django-mfa2_project
- django-mfa2
CWE
CWE-294
Authentication Bypass by Capture-replay