VYPR

RubyGems package

devise-two-factor

pkg:gem/devise-two-factor

Vulnerabilities (3)

  • CVE-2024-8796Sep 17, 2024
    affected >= 4.0.0, < 6.0.0fixed 6.0.0

    Under the default configuration, Devise-Two-Factor versions >= 2.2.0 & < 6.0.0 generate TOTP shared secrets that are 120 bits instead of the 128-bit minimum defined by RFC 4226. Using a shared secret shorter than the minimum to generate a multi-factor authentication code could ma

  • CVE-2021-43177Apr 11, 2022
    affected < 4.0.2fixed 4.0.2

    As a result of an incomplete fix for CVE-2015-7225, in versions of devise-two-factor prior to 4.0.2 it is possible to reuse a One-Time-Password (OTP) for one (and only one) immediately trailing interval. CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)

  • CVE-2015-7225MedSep 6, 2017
    affected < 2.0.0fixed 2.0.0

    Tinfoil Devise-two-factor before 2.0.0 does not strictly follow section 5.2 of RFC 6238 and does not "burn" a successfully validated one-time password (aka OTP), which allows remote or physically proximate attackers with a target user's login credentials to log in as said user by