Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-vhmj-5q9r-mm9g: BlastRADIUS also affects eduMFA

Summary

BlastRADIUS (see blastradius.fail for details) also affects eduMFA prior version 2.2.0, because the Message-Authenticator attributes were not checked.

Details

Website with the vulnerability information blastradius.fail The original vulnerability has been assigned CVE-2024-3596 Case in vince: https://kb.cert.org/vuls/id/456537

PoC

There is no known proof-of-concept except for the attack shown in the paper from the researchers

Impact

An attacker can trigger an authentication flow with a RADIUS-backed token, intercept the RADIUS packet sent by eduMFA and modify the RADIUS server’s answer, which would lead eduMFA to believe that the token is valid, even though the RADIUS servers answer was a reject.

ghsa
#vulnerability#web#git#auth
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-vhmj-5q9r-mm9g

BlastRADIUS also affects eduMFA

Moderate severity GitHub Reviewed Published Jul 17, 2024 in eduMFA/eduMFA • Updated Jul 17, 2024

Affected versions

< 2.2.0

Description

Summary

BlastRADIUS (see blastradius.fail for details) also affects eduMFA prior version 2.2.0, because the Message-Authenticator attributes were not checked.

Details

Website with the vulnerability information blastradius.fail
The original vulnerability has been assigned CVE-2024-3596
Case in vince: https://kb.cert.org/vuls/id/456537

PoC

There is no known proof-of-concept except for the attack shown in the paper from the researchers

Impact

An attacker can trigger an authentication flow with a RADIUS-backed token, intercept the RADIUS packet sent by eduMFA and modify the RADIUS server’s answer, which would lead eduMFA to believe that the token is valid, even though the RADIUS servers answer was a reject.

References

  • GHSA-vhmj-5q9r-mm9g
  • https://nvd.nist.gov/vuln/detail/CVE-2024-3596
  • eduMFA/eduMFA@ad9d18b
  • https://kb.cert.org/vuls/id/456537

Published to the GitHub Advisory Database

Jul 17, 2024

Last updated

Jul 17, 2024

Severity

CVSS base metrics

User interaction

Required

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

Weaknesses

GHSA ID

GHSA-vhmj-5q9r-mm9g

Source code

ghsa: Latest News

GHSA-7p9f-6x8j-gxxp: CRI-O: Maliciously structured checkpoint file can gain arbitrary node access