Under the default configuration, Devise-Two-Factor versions >= 2.2.0 & < 6.0.0 generate TOTP shared secrets that are 120 bits instead of the 128-bit minimum defined by RFC 4226. Using a shared secret shorter than the minimum to generate a multi-factor authentication code could make it easier for an attacker to guess the shared secret and generate valid TOTP codes.
References
Link | Resource |
---|---|
https://github.com/devise-two-factor/devise-two-factor/security/advisories/GHSA-qjxf-mc72-wjr2 | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
30 Sep 2024, 14:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/devise-two-factor/devise-two-factor/security/advisories/GHSA-qjxf-mc72-wjr2 - Mitigation, Vendor Advisory | |
First Time |
Tinfoilsecurity
Tinfoilsecurity devise-two-factor |
|
CPE | cpe:2.3:a:tinfoilsecurity:devise-two-factor:1.0.0:*:*:*:*:*:*:* cpe:2.3:a:tinfoilsecurity:devise-two-factor:*:*:*:*:*:*:*:* |
20 Sep 2024, 12:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
17 Sep 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-17 18:15
Updated : 2024-09-30 14:10
NVD link : CVE-2024-8796
Mitre link : CVE-2024-8796
CVE.ORG link : CVE-2024-8796
JSON object : View
Products Affected
tinfoilsecurity
- devise-two-factor
CWE
CWE-331
Insufficient Entropy