CVE-2015-7225
Summary
| CVE | CVE-2015-7225 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-09-06 21:29:00 UTC |
| Updated | 2017-09-21 18:57:00 UTC |
| Description | Tinfoil Devise-two-factor before 2.0.0 does not strictly follow section 5.2 of RFC 6238 and does not "burn" a successfully validated one-time password (aka OTP), which allows remote or physically proximate attackers with a target user's login credentials to log in as said user by obtaining the OTP through performing a man-in-the-middle attack between the provider and verifier, or shoulder surfing, and replaying the OTP in the current time-step. |
Risk And Classification
Problem Types: CWE-254
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Tinfoilsecurity | Devise-two-factor | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| oss-security - Re: CVE Request: TOTP Replay Attack in Ruby library "devise-two-factor" | MLIST | www.openwall.com | Mailing List, VDB Entry |
| Security Bug · Issue #45 · tinfoil/devise-two-factor · GitHub | CONFIRM | github.com | Third Party Advisory |
| #798466 - ruby-devise-two-factor: CVE-2015-7225: TOTP Replay Attack - Debian Bug report logs | MISC | bugs.debian.org | Mailing List, Third Party Advisory |
| Tinfoil Devise-two-factor CVE-2015-7225 Security Bypass Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| oss-security - CVE Request: MITM & Shoulder-surfing vuln in Ruby OTP/HOTP/TOTP library "ROPT" | MLIST | www.openwall.com | Mailing List, VDB Entry |
| devise-two-factor/UPGRADING.md at master · tinfoil/devise-two-factor · GitHub | CONFIRM | github.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.