mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay attack that could be used to register another device for a user. The device registration challenge is not invalidated after usage.
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).
Name | Vendor | Start Version | End Version |
---|---|---|---|
Django-mfa2 | Django-mfa2_project | * | 2.5.1 (excluding) |
Django-mfa2 | Django-mfa2_project | 2.6.0 (including) | 2.6.1 (excluding) |