5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.967 High
EPSS
Percentile
99.7%
This module will allow you to add Time-based One-time Password Algorithm (also called “Two Step Authentication” or “Multi-Factor Authentication”) support to user logins. It works with Google’s Authenticator app system and support most (if not all) OATH based HOTP/TOTP systems.
In certain scenarios, Google Authenticator login incorrectly determines the user’s account name. The change in account name could cause the two-factor authentication for existing accounts to be lost, allowing users to log in using just username and password.
This vulnerability is mitigated by the fact while Google Authenticator login’s additional verification is by-passed, a username and password are still required to log in.
If an attacker can intercept a login request with a username, password and OTP, an attacker could use this same data again to login to the website.
This vulnerability is mitigated by the fact that an attacker who can intercept a login request with this level of detail can usually also intercept the ongoing session identifying token.
Drupal core is not affected. If you do not use the contributed Google Authenticator login module, there is nothing you need to do.
Install the latest version:
Also see the Google Authenticator login project page.