logo

GHSA-vhmj-5q9r-mm9g edumfa

Package

Manager: pip
Name: edumfa
Vulnerable Version: >=0 <2.2.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N

EPSS: N/A pctlN/A

Details

BlastRADIUS also affects eduMFA ### Summary BlastRADIUS (see blastradius.fail for details) also affects eduMFA prior version 2.2.0, because the Message-Authenticator attributes were not checked. ### Details Website with the vulnerability information blastradius.fail The original vulnerability has been assigned CVE-2024-3596 Case in vince: https://kb.cert.org/vuls/id/456537 ### PoC There is no known proof-of-concept except for the attack shown in the paper from the researchers ### Impact An attacker can trigger an authentication flow with a RADIUS-backed token, intercept the RADIUS packet sent by eduMFA and modify the RADIUS server's answer, which would lead eduMFA to believe that the token is valid, even though the RADIUS servers answer was a reject.

Metadata

Created: 2024-07-17T16:01:37Z
Modified: 2024-07-17T16:01:37Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/07/GHSA-vhmj-5q9r-mm9g/GHSA-vhmj-5q9r-mm9g.json
CWE IDs: ["CWE-924"]
Alternative ID: N/A
Finding: F014
Auto approve: 1