Description
Tinfoil Devise-two-factor before 2.0.0 does not strictly follow section 5.2 of RFC 6238 and does not "burn" a successfully validated one-time password (aka OTP), which allows remote or physically proximate attackers with a target user's login credentials to log in as said user by obtaining the OTP through performing a man-in-the-middle attack between the provider and verifier, or shoulder surfing, and replaying the OTP in the current time-step.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0428 | Tinfoil Devise-two-factor before 2.0.0 does not strictly follow section 5.2 of RFC 6238 and does not "burn" a successfully validated one-time password (aka OTP), which allows remote or physically proximate attackers with a target user's login credentials to log in as said user by obtaining the OTP through performing a man-in-the-middle attack between the provider and verifier, or shoulder surfing, and replaying the OTP in the current time-step. |
Github GHSA |
GHSA-x489-jjwm-52g7 | Tinfoil Devise-two-factor does not "burn" a successfully validated one-time password (OTP) |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T07:43:45.764Z
Reserved: 2015-09-17T00:00:00.000Z
Link: CVE-2015-7225
No data.
Status : Modified
Published: 2017-09-06T21:29:00.957
Modified: 2026-05-13T00:24:29.033
Link: CVE-2015-7225
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA