Description
eLabFTW is an open source electronic lab notebook. In elabftw versions through 5.4.1, the login flow did not reliably preserve the multi-factor authentication state across authentication steps. Under certain conditions, an attacker with valid primary credentials could complete authentication with an attacker-controlled TOTP secret and bypass the additional factor. This could result in unauthorized account access. This issue is fixed in version 5.4.2.
Problem types
CWE-302: Authentication Bypass by Assumed-Immutable Data
Product status
References
github.com/...labftw/security/advisories/GHSA-x5wv-c9q4-fj65
github.com/...ommit/8b7a575aef128870861187eaa2b2f0f08654ecf9