Skip to content

Second Factor Bypass Through User-Controlled Key

Moderate
Abraxas-Bot published GHSA-5jf8-3mj5-pj88 Sep 13, 2022

Package

VOTING IAM (Abraxas Apps Platform)

Affected versions

<= v1.6.0

Patched versions

v1.8.4

Description

Short Description

Possible second factor authentication bypass by directly using a vulnerability within the last endpoint of the 2FA flow.

Reporting Date

  1. August 2022

Details

An attacker who is already in possession of a victim's credentials could utilize the /secondfactor/done endpoint to directly acquire an access token without a real 2FA verification just by passing the request id used during the login.

Impact

Medium

References

  • Bug Bounty ID: ec8f4aae (Private)
  • Internal ID: SEC-790

❤ Thanks to

Simon Reinhart for reporting the vulnerability within the 2FA verification.

Severity

Moderate
6.3
/ 10

CVSS base metrics

Attack vector
Adjacent
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
None
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

CVE ID

No known CVE

Weaknesses