eLabFTW is an open source electronic lab notebook for research labs. A vulnerability has been found starting in version 4.6.0 and prior to version 5.1.0 that allows an attacker to bypass eLabFTW's built-in multifactor authentication mechanism. An attacker who can authenticate locally (by knowing or guessing the password of a user) can thus log in regardless of MFA requirements. This does not affect MFA that are performed by single sign-on services. Users are advised to upgrade to at least version 5.1.9 to receive a fix.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 09 Dec 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | eLabFTW is an open source electronic lab notebook for research labs. A vulnerability has been found starting in version 4.6.0 and prior to version 5.1.0 that allows an attacker to bypass eLabFTW's built-in multifactor authentication mechanism. An attacker who can authenticate locally (by knowing or guessing the password of a user) can thus log in regardless of MFA requirements. This does not affect MFA that are performed by single sign-on services. Users are advised to upgrade to at least version 5.1.9 to receive a fix. | |
Title | eLabFTW MFA bypass | |
Weaknesses | CWE-288 CWE-303 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-12-09T18:38:42.856Z
Updated: 2024-12-10T16:20:39.487Z
Reserved: 2024-11-14T15:05:46.766Z
Link: CVE-2024-52586

Updated: 2024-12-10T16:20:35.694Z

Status : Received
Published: 2024-12-09T19:15:13.707
Modified: 2024-12-09T19:15:13.707
Link: CVE-2024-52586

No data.