GHSA-vhmj-5q9r-mm9g – edumfa
Package
Manager: pip
Name: edumfa
Vulnerable Version: >=0 <2.2.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N
EPSS: N/A pctlN/A
Details
BlastRADIUS also affects eduMFA ### Summary BlastRADIUS (see blastradius.fail for details) also affects eduMFA prior version 2.2.0, because the Message-Authenticator attributes were not checked. ### Details Website with the vulnerability information blastradius.fail The original vulnerability has been assigned CVE-2024-3596 Case in vince: https://kb.cert.org/vuls/id/456537 ### PoC There is no known proof-of-concept except for the attack shown in the paper from the researchers ### Impact An attacker can trigger an authentication flow with a RADIUS-backed token, intercept the RADIUS packet sent by eduMFA and modify the RADIUS server's answer, which would lead eduMFA to believe that the token is valid, even though the RADIUS servers answer was a reject.
Metadata
Created: 2024-07-17T16:01:37Z
Modified: 2024-07-17T16:01:37Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/07/GHSA-vhmj-5q9r-mm9g/GHSA-vhmj-5q9r-mm9g.json
CWE IDs: ["CWE-924"]
Alternative ID: N/A
Finding: F014
Auto approve: 1