View online: https://www.drupal.org/sa-contrib-2024-043
Project: Two-factor Authentication (TFA) [1] Date: 2024-October-02 Security risk: *Critical* 15 ∕ 25 AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:All [2] Vulnerability: Access bypass
Affected versions: <1.8.0 Description: This module enables you to allow and/or require users to use a second authentication method in addition to password authentication.
The module does not sufficiently migrate sessions before prompting for a second factor token.
This vulnerability is mitigated by the fact that an attacker must fixate a session on a victim system that is then authenticated with username and password without completing Two Factor authentication. An attacker must gather additional information regarding the entry form after authentication. An attacker must still present a valid token to complete authentication.
Solution: Install the latest version:
* If you use the Two-factor Authentication (TFA) module for Drupal 8+ upgrade to Two-factor Authentication (TFA) 8.x-1.8 [3] * If you use the Two-factor Authentication (TFA) module for Drupal 7 upgrade to Two-factor Authentication (TFA) 7.x-2.4 [4]
Reported By: * Francesco Placella [5]
Fixed By: * Francesco Placella [6] * Juraj Nemec [7] of the Drupal Security Team * Conrad Lara [8]
Coordinated By: * Greg Knaddison [9] of the Drupal Security Team * Juraj Nemec [10] of the Drupal Security Team
[1] https://www.drupal.org/project/tfa [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/tfa/releases/8.x-1.8 [4] https://www.drupal.org/project/tfa/releases/7.x-2.4 [5] https://www.drupal.org/user/183211 [6] https://www.drupal.org/user/183211 [7] https://www.drupal.org/user/272316 [8] https://www.drupal.org/user/1790054 [9] https://www.drupal.org/u/greggles [10] https://www.drupal.org/u/poker10