CVE-2020-5240 – wagtail-2fa
Package
Manager: pip
Name: wagtail-2fa
Vulnerable Version: >=0 <1.4.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:H/SA:N
EPSS: 0.00161 pctl0.37497
Details
2FA bypass through deleting devices in wagtail-2fa ### Impact Any user with access to the CMS can view and delete other users' 2FA devices by going to the correct path. The user does not require special permissions in order to do so. By deleting the other user's device they can disable the target user's 2FA devices and potentially compromise the account if they figure out their password. ### Patches The problem has been patched in version 1.4.1. ### Workarounds There is no workaround for this issue. ### For more information If you have any questions or comments about this advisory: * Open an issue in [github.com/labd/wagtail-2fa](https://github.com/labd/wagtail-2fa) * Email us at [security@labdigital.nl](mailto:security@labdigital.nl)
Metadata
Created: 2020-03-13T21:18:55Z
Modified: 2024-11-19T15:35:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/03/GHSA-9gjv-6qq6-v7qm/GHSA-9gjv-6qq6-v7qm.json
CWE IDs: ["CWE-285"]
Alternative ID: GHSA-9gjv-6qq6-v7qm
Finding: F039
Auto approve: 1