CVE-2015-7225

EUVD-2018-0428
Tinfoil Devise-two-factor before 2.0.0 does not strictly follow section 5.2 of RFC 6238 and does not "burn" a successfully validated one-time password (aka OTP), which allows remote or physically proximate attackers with a target user's login credentials to log in as said user by obtaining the OTP through performing a man-in-the-middle attack between the provider and verifier, or shoulder surfing, and replaying the OTP in the current time-step.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 70%
Affected Products (NVD)
VendorProductVersion
tinfoilsecuritydevise-two-factor
𝑥
≤ 1.1.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ruby-devise-two-factor
bookworm
4.0.2-1
fixed
bullseye
3.1.0-2
fixed
sid
4.0.2-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby-devise-two-factor
artful
ignored
bionic
dne
cosmic
dne
precise
dne
trusty
dne
vivid
dne
wily
ignored
xenial
not-affected
yakkety
ignored
zesty
ignored
Common Weakness Enumeration