it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecNots] [Security-news] Enterprise MFA - TFA for Drupal - Moderately critical - Access bypass - SA-CONTRIB-2025-052
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] Enterprise MFA - TFA for Drupal - Moderately critical - Access bypass - SA-CONTRIB-2025-052
- Date: Wed, 7 May 2025 17:07:15 +0000 (UTC)
- Authentication-results: lists.piratenpartei.de; dkim=pass header.d=drupal.org header.s=default header.b=fG973j9g; dmarc=pass (policy=none) header.from=drupal.org; spf=pass (lists.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 2605:bc80:3010::133 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 9FF9B43685
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 60DAA419B9
- List-archive: <http://lists.drupal.org/pipermail/security-news/>
- List-id: <security-news.drupal.org>
View online: https://www.drupal.org/sa-contrib-2025-052
Project: Enterprise MFA - TFA for Drupal [1]
Date: 2025-May-07
Security risk: *Moderately critical* 14 ∕ 25
AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Access bypass
Affected versions: <4.7.0 || >=5.2.0 <5.2.0 || 5.0.*
CVE IDs: CVE-2025-47706
Description:
The module enables you to add second-factor authentication in addition to the
default Drupal login.
The module doesn't sufficiently check whether the TOTP token is already used
or not for authenticator-based second-factor methods.
This vulnerability is mitigated by the fact that an attacker must have a
username, password and TOTP token generated within the last 5 minutes.
Solution:
Install the latest version:
* If you use the Enterprise MFA - TFA for Drupal Drupal ^9.3, Drupal 10 and
Drupal 11 upgrade to miniorange_2fa 5.2.0 [3].
* If you use the Enterprise MFA - TFA for Drupal Drupal 8, Drupal 9 and
Drupal 10 upgrade to miniorange_2fa 8.x-4.7 [4].
Reported By:
* Conrad Lara (cmlara) [5]
Fixed By:
* Sudhanshu Dhage (sudhanshu0542) [6]
Coordinated By:
* Greg Knaddison (greggles) [7] of the Drupal Security Team
* Juraj Nemec (poker10) [8] of the Drupal Security Team
[1] https://www.drupal.org/project/miniorange_2fa
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/miniorange_2fa/releases/5.2.0
[4] https://www.drupal.org/project/miniorange_2fa/releases/8.x-4.7
[5] https://www.drupal.org/u/cmlara
[6] https://www.drupal.org/u/sudhanshu0542
[7] https://www.drupal.org/u/greggles
[8] https://www.drupal.org/u/poker10
_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news
- [IT-SecNots] [Security-news] Enterprise MFA - TFA for Drupal - Moderately critical - Access bypass - SA-CONTRIB-2025-052, security-news, 07.05.2025
Archiv bereitgestellt durch MHonArc 2.6.19+.