Tinfoil Devise-two-factor before 2.0.0 does not strictly follow section 5.2 of RFC 6238 and does not "burn" a successfully validated one-time password (aka OTP), which allows remote or physically proximate attackers with a target user's login credentials to log in as said user by obtaining the OTP through performing a man-in-the-middle attack between the provider and verifier, or shoulder surfing, and replaying the OTP in the current time-step.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0428 | Tinfoil Devise-two-factor before 2.0.0 does not strictly follow section 5.2 of RFC 6238 and does not "burn" a successfully validated one-time password (aka OTP), which allows remote or physically proximate attackers with a target user's login credentials to log in as said user by obtaining the OTP through performing a man-in-the-middle attack between the provider and verifier, or shoulder surfing, and replaying the OTP in the current time-step. |
Github GHSA |
GHSA-x489-jjwm-52g7 | Tinfoil Devise-two-factor does not "burn" a successfully validated one-time password (OTP) |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T07:43:45.764Z
Reserved: 2015-09-17T00:00:00
Link: CVE-2015-7225
No data.
Status : Deferred
Published: 2017-09-06T21:29:00.957
Modified: 2025-04-20T01:37:25.860
Link: CVE-2015-7225
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA