Description
Tinfoil Devise-two-factor before 2.0.0 does not strictly follow section 5.2 of RFC 6238 and does not "burn" a successfully validated one-time password (aka OTP), which allows remote or physically proximate attackers with a target user's login credentials to log in as said user by obtaining the OTP through performing a man-in-the-middle attack between the provider and verifier, or shoulder surfing, and replaying the OTP in the current time-step.
Published: 2017-09-06
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-0428 Tinfoil Devise-two-factor before 2.0.0 does not strictly follow section 5.2 of RFC 6238 and does not "burn" a successfully validated one-time password (aka OTP), which allows remote or physically proximate attackers with a target user's login credentials to log in as said user by obtaining the OTP through performing a man-in-the-middle attack between the provider and verifier, or shoulder surfing, and replaying the OTP in the current time-step.
Github GHSA Github GHSA GHSA-x489-jjwm-52g7 Tinfoil Devise-two-factor does not "burn" a successfully validated one-time password (OTP)
History

No history.

Subscriptions

Tinfoilsecurity Devise-two-factor
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T07:43:45.764Z

Reserved: 2015-09-17T00:00:00.000Z

Link: CVE-2015-7225

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2017-09-06T21:29:00.957

Modified: 2026-05-13T00:24:29.033

Link: CVE-2015-7225

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses