mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay attack that could be used to register another device for a user. The device registration challenge is not invalidated after usage.
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).
Link | Tags |
---|---|
https://github.com/mkalioby/django-mfa2/blob/0936ea253354dd95cb127f09d0efa31324caef27/mfa/FIDO2.py#L58 | third party advisory exploit |
https://github.com/mkalioby/django-mfa2/releases/tag/v2.5.1-release | third party advisory release notes |
https://github.com/mkalioby/django-mfa2/releases/tag/v2.6.1-release | third party advisory release notes |