Skip to main content

Authentication Bypass by Capture-replay


Severity High
Score 7.5/10


django-mfa2 prior to 2.5.1 and 2.6.x prior to 2.6.1 allows a replay attack that could be used to register another device for a user using "mfa/". The device registration challenge is not invalidated after usage.

  • LOW
  • HIGH
  • NONE
  • NONE
  • NONE
  • NONE

CWE-294 - Authentication Bypass by Capture-replay

A capture-replay flaw exists when the design of the software makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).

Advisory Timeline

  • Published