Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-9phw-7h96-q3rv: scheb/two-factor-bundle bypass two-factor authentication with remember-me option

In versions prior to 3.26.0 and prior to 4.11.0 of the “scheb/two-factor-bundle” project, a security vulnerability allowed attackers to bypass two-factor authentication (2FA) using the remember_me cookie. When the remember_me checkbox was used during login, a “REMEMBERME” cookie was created. Upon redirection to the 2FA page, attackers could manipulate the SESSIONID key, granting access to the homepage “/” and gaining authentication without completing 2FA.

ghsa
#vulnerability#git#auth

Skip to content

Navigation Menu

    • Actions

      Automate any workflow

    • Packages

      Host and manage packages

    • Security

      Find and fix vulnerabilities

    • Codespaces

      Instant dev environments

    • Copilot

      Write better code with AI

    • Code review

      Manage code changes

    • Issues

      Plan and track work

    • Discussions

      Collaborate outside of code

    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
  • Pricing

Provide feedback

Saved searches****Use saved searches to filter your results more quickly

Sign up

  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-9phw-7h96-q3rv

scheb/two-factor-bundle bypass two-factor authentication with remember-me option

High severity GitHub Reviewed Published May 21, 2024 to the GitHub Advisory Database • Updated May 21, 2024

Package

composer scheb/two-factor-bundle (Composer)

Affected versions

>= 4.0.0, < 4.11.0

< 3.26.0

Patched versions

4.11.0

3.26.0

Description

Published to the GitHub Advisory Database

May 21, 2024

Last updated

May 21, 2024

ghsa: Latest News

GHSA-wc9m-r3v6-9p5h: Sparkle Signing Checks Bypass