[Security-news] Email TFA - Moderately critical - Access bypass - SA-CONTRIB-2025-001

security-news at drupal.org security-news at drupal.org
Wed Jan 8 18:39:43 UTC 2025


View online: https://www.drupal.org/sa-contrib-2025-001

Project: Email TFA [1]
Date: 2025-January-08
Security risk: *Moderately critical* 14 ∕ 25
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Access bypass

Affected versions: <2.0.3
Description: 
This module enables you to do Two-Factor Authentication by email, using a
user registered email to send a verification code to the user's email every
time the user tries to log in to your site.

The module did not sufficiently protect against brute force attacks, allowing
an attacker to bypass the second factor.

This vulnerability is mitigated by the fact the attacker must be able to
present the username and first factor (i.e. password).

Solution: 
Install the latest version:

   * If you use the Email TFA module, upgrade to Email TFA 2.0.3 [3]

Reported By: 
   * Ursin Cola [4]

Fixed By: 
   * Ursin Cola [5]
   * abdulaziz zaid [6]

Coordinated By: 
   * Greg Knaddison [7] of the Drupal Security Team
   * Juraj Nemec [8] of the Drupal Security Team


[1] https://www.drupal.org/project/email_tfa
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/email_tfa/releases/2.0.3
[4] https://www.drupal.org/user/679260
[5] https://www.drupal.org/user/679260
[6] https://www.drupal.org/user/3585656
[7] https://www.drupal.org/user/36762
[8] https://www.drupal.org/user/272316



More information about the Security-news mailing list