Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [Security-news] One Time Password - Moderately critical - Access bypass - SA-CONTRIB-2025-063

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [Security-news] One Time Password - Moderately critical - Access bypass - SA-CONTRIB-2025-063


Chronologisch Thread  
  • From: security-news AT drupal.org
  • To: security-news AT drupal.org
  • Subject: [IT-SecNots] [Security-news] One Time Password - Moderately critical - Access bypass - SA-CONTRIB-2025-063
  • Date: Wed, 14 May 2025 18:05:33 +0000 (UTC)
  • Authentication-results: lists.piratenpartei.de; dkim=pass header.d=drupal.org header.s=default header.b=SWcyYmOm; spf=pass (lists.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 2605:bc80:3010::138 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org; dmarc=pass (policy=none) header.from=drupal.org
  • Dkim-filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org A4FE583CF4
  • Dkim-filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 2C35340FA4
  • List-archive: <http://lists.drupal.org/pipermail/security-news/>
  • List-id: <security-news.drupal.org>

View online: https://www.drupal.org/sa-contrib-2025-063

Project: One Time Password [1]
Date: 2025-May-14
Security risk: *Moderately critical* 14 ∕ 25
AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Access bypass

Affected versions: <1.3.0
CVE IDs: CVE-2025-48012
Description: 
This module enables you to allow users to include a second authentication
method in addition to password authentication.

The module doesn't sufficiently prevent the same TFA token within a 30 second
window.

This vulnerability is mitigated by the fact that an attacker must obtain a
valid username/password and second factor.

Solution: 
Install the latest version:

* If you use the One Time Password module for Drupal, upgrade to One Time
Password 8.x-1.3 [3]

Reported By: 
* Conrad Lara (cmlara) [4]

Fixed By: 
* danielveza [5]
* Lee Rowlands (larowlan) [6] of the Drupal Security Team
* Ivo Van Geertruyen (mr.baileys) [7] of the Drupal Security Team

Coordinated By: 
* Greg Knaddison (greggles) [8] of the Drupal Security Team
* Juraj Nemec (poker10) [9] of the Drupal Security Team


[1] https://www.drupal.org/project/one_time_password
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/one_time_password/releases/8.x-1.3
[4] https://www.drupal.org/u/cmlara
[5] https://www.drupal.org/u/danielveza
[6] https://www.drupal.org/u/larowlan
[7] https://www.drupal.org/u/mrbaileys
[8] https://www.drupal.org/u/greggles
[9] https://www.drupal.org/u/poker10

_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news


  • [IT-SecNots] [Security-news] One Time Password - Moderately critical - Access bypass - SA-CONTRIB-2025-063, security-news, 14.05.2025

Archiv bereitgestellt durch MHonArc 2.6.19+.

Seitenanfang