PYSEC-2019-135

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/wagtail-2fa/PYSEC-2019-135.yaml
JSON Data
https://api.test.osv.dev/v1/vulns/PYSEC-2019-135
Aliases
Published
2019-11-29T17:15:00Z
Modified
2023-11-01T04:50:39.874611Z
Summary
[none]
Details

When using wagtail-2fa before 1.3.0, if someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS. This problem has been patched in version 1.3.0.

References

Affected packages

PyPI / wagtail-2fa

Package

Affected ranges

Type
GIT
Repo
https://github.com/labd/wagtail-2fa
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.0

Affected versions

0.*
0.0.1
0.0.2
0.0.3
0.1.0
1.*
1.0.0
1.0.1
1.1.0
1.2.0

Database specific

source
"https://github.com/pypa/advisory-database/blob/main/vulns/wagtail-2fa/PYSEC-2019-135.yaml"