GHSA-89px-ww3j-g2mm

Suggest an improvement
Source
https://github.com/advisories/GHSA-89px-ww3j-g2mm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/11/GHSA-89px-ww3j-g2mm/GHSA-89px-ww3j-g2mm.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-89px-ww3j-g2mm
Aliases
Related
Published
2019-11-29T17:05:59Z
Modified
2026-01-30T01:44:03.609453Z
Severity
  • 8.7 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N CVSS Calculator
  • 6.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N CVSS Calculator
Summary
2FA bypass in Wagtail through new device path
Details

2FA bypass through new device path

Impact

If someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS.

Patches

This problem has been patched in version 1.3.0.

Workarounds

There is no workaround at the moment.

For more information

If you have any questions or comments about this advisory: * Open an issue in github.com/labd/wagtail-2fa * Email us at security@labdigital.nl

Database specific
{
    "cwe_ids": [
        "CWE-290",
        "CWE-304"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T21:25:10Z",
    "nvd_published_at": null,
    "severity": "MODERATE"
}
References

Affected packages

PyPI / wagtail-2fa

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.0

Affected versions

0.*
0.0.1
0.0.2
0.0.3
0.1.0
1.*
1.0.0
1.0.1
1.1.0
1.2.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/11/GHSA-89px-ww3j-g2mm/GHSA-89px-ww3j-g2mm.json"