Summary
This flaw allows attackers possessing valid user credentials to bypass MFA by utilizing certain endpoints. Utilizing valid user credentials, the Swagger interface for the API did not respect MFA settings for basic and cookie authentication mechanisms. This flaw is also present in the /api/v2/api-token-auth endpoint.
Patches
This vulnerability was addressed in DefectDojo Pro 2.49.2
Workarounds
Upgrade to DefectDojo Pro 2.49.2
Impact
If a malicious actor was successful in compromising the credentials of a valid a user, this flaw would allow that malicious actor to bypass MFA.
Credits
Aadesh Jain (@ajcybertron)
Summary
This flaw allows attackers possessing valid user credentials to bypass MFA by utilizing certain endpoints. Utilizing valid user credentials, the Swagger interface for the API did not respect MFA settings for basic and cookie authentication mechanisms. This flaw is also present in the /api/v2/api-token-auth endpoint.
Patches
This vulnerability was addressed in DefectDojo Pro 2.49.2
Workarounds
Upgrade to DefectDojo Pro 2.49.2
Impact
If a malicious actor was successful in compromising the credentials of a valid a user, this flaw would allow that malicious actor to bypass MFA.
Credits
Aadesh Jain (@ajcybertron)