logo

CVE-2019-16766 wagtail-2fa

Package

Manager: pip
Name: wagtail-2fa
Vulnerable Version: >=0 <1.3.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N

EPSS: 0.0017 pctl0.3872

Details

2FA bypass in Wagtail through new device path ## 2FA bypass through new device path ### Impact If someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS. ### Patches This problem has been patched in version 1.3.0. ### Workarounds There is no workaround at the moment. ### For more information If you have any questions or comments about this advisory: * Open an issue in [github.com/labd/wagtail-2fa](https://github.com/labd/wagtail-2fa) * Email us at [security@labdigital.nl](mailto:security@labdigital.nl)

Metadata

Created: 2019-11-29T17:05:59Z
Modified: 2024-11-19T15:48:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/11/GHSA-89px-ww3j-g2mm/GHSA-89px-ww3j-g2mm.json
CWE IDs: ["CWE-290", "CWE-304"]
Alternative ID: GHSA-89px-ww3j-g2mm
Finding: F006
Auto approve: 1