Vulnerability from drupal
Published
2024-10-02 16:20
Modified
2025-02-20 19:27
Summary
Details
This module enables you to allow and/or require users to use a second authentication method in addition to password authentication.
The module does not sufficiently migrate sessions before prompting for a second factor token.
This vulnerability is mitigated by the fact that an attacker must fixate a session on a victim system that is then authenticated with username and password without completing Two Factor authentication. An attacker must gather additional information regarding the entry form after authentication. An attacker must still present a valid token to complete authentication.
Credits
Francesco Placella
www.drupal.org/user/183211
{
"affected": [
{
"database_specific": {
"affected_versions": "\u003c1.8.0"
},
"package": {
"ecosystem": "Packagist:https://packages.drupal.org/8",
"name": "drupal/tfa"
},
"ranges": [
{
"database_specific": {
"constraint": "\u003c1.8.0"
},
"events": [
{
"introduced": "0"
},
{
"fixed": "1.8.0"
}
],
"type": "ECOSYSTEM"
}
],
"severity": []
}
],
"aliases": [
"CVE-2024-13279"
],
"credits": [
{
"contact": [
"https://www.drupal.org/user/183211"
],
"name": "Francesco Placella"
}
],
"details": "This module enables you to allow and/or require users to use a second authentication method in addition to password authentication.\n\nThe module does not sufficiently migrate sessions before prompting for a second factor token.\n\nThis vulnerability is mitigated by the fact that an attacker must fixate a session on a victim system that is then authenticated with username and password without completing Two Factor authentication. An attacker must gather additional information regarding the entry form after authentication. An attacker must still present a valid token to complete authentication.",
"id": "DRUPAL-CONTRIB-2024-043",
"modified": "2025-02-20T19:27:03.000Z",
"published": "2024-10-02T16:20:48.000Z",
"references": [
{
"type": "WEB",
"url": "https://www.drupal.org/sa-contrib-2024-043"
}
],
"schema_version": "1.7.0"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…