Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [Security-news] One Time Password - Moderately critical - Access bypass - SA-CONTRIB-2025-062

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [Security-news] One Time Password - Moderately critical - Access bypass - SA-CONTRIB-2025-062


Chronologisch Thread  
  • From: security-news AT drupal.org
  • To: security-news AT drupal.org
  • Subject: [IT-SecNots] [Security-news] One Time Password - Moderately critical - Access bypass - SA-CONTRIB-2025-062
  • Date: Wed, 14 May 2025 18:05:22 +0000 (UTC)
  • Authentication-results: lists.piratenpartei.de; dkim=pass header.d=drupal.org header.s=default header.b=CwlwwA46; spf=pass (lists.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 2605:bc80:3010::133 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org; dmarc=pass (policy=none) header.from=drupal.org
  • Dkim-filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org B487E422FC
  • Dkim-filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org B13F860818
  • List-archive: <http://lists.drupal.org/pipermail/security-news/>
  • List-id: <security-news.drupal.org>

View online: https://www.drupal.org/sa-contrib-2025-062

Project: One Time Password [1]
Date: 2025-May-14
Security risk: *Moderately critical* 14 ∕ 25
AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Access bypass

Affected versions: <1.3.0
CVE IDs: CVE-2025-48011
Description: 
This module enables you to allow users to include a second authentication
method in addition to password authentication.

The module doesn't sufficiently prevent TFA from being bypassed when using
the REST login routes.

A new requirements check has been added to the status report so other
authentication providers can be assessed to check if they also allow for this
bypass.

This vulnerability is mitigated by the fact that an attacker must obtain a
valid username/password.

Solution: 
Install the latest version:

* If you use the One Time Password module for Drupal, upgrade to One Time
Password 8.x-1.3 [3]

Reported By: 
* Conrad Lara (cmlara) [4]

Fixed By: 
* danielveza [5]
* Kim Pepper (kim.pepper) [6]
* Lee Rowlands (larowlan) [7] of the Drupal Security Team

Coordinated By: 
* Greg Knaddison (greggles) [8] of the Drupal Security Team
* Juraj Nemec (poker10) [9] of the Drupal Security Team


[1] https://www.drupal.org/project/one_time_password
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/one_time_password/releases/8.x-1.3
[4] https://www.drupal.org/u/cmlara
[5] https://www.drupal.org/u/danielveza
[6] https://www.drupal.org/u/kimpepper
[7] https://www.drupal.org/u/larowlan
[8] https://www.drupal.org/u/greggles
[9] https://www.drupal.org/u/poker10

_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news


  • [IT-SecNots] [Security-news] One Time Password - Moderately critical - Access bypass - SA-CONTRIB-2025-062, security-news, 14.05.2025

Archiv bereitgestellt durch MHonArc 2.6.19+.

Seitenanfang