You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The code login method is enabled with the passwordless_enabled flag set to true .
A 2FA method such as totp is enabled.
required_aal of the whomai check or the settings flow is set to highest_available. AAL stands for Authenticator Assurance Levels and can range from 0 (no factor) to 2 (two factors).
A user uses the code method as the only login method available. They do not have a password or any other first factor credential enabled.
The user has 2FA enabled.
The user’s available_aal is incorrectly stored in the database as aal1 or aal0...
Advisory GHSA-wc43-73w7-x2f5 references a vulnerability in the following Go modules:
Description:
Preconditions
code
login method is enabled with thepasswordless_enabled
flag set totrue
.totp
is enabled.required_aal
of the whomai check or the settings flow is set tohighest_available
. AAL stands for Authenticator Assurance Levels and can range from 0 (no factor) to 2 (two factors).code
method as the only login method available. They do not have a password or any other first factor credential enabled.available_aal
is incorrectly stored in the database asaal1
oraal0
...References:
No existing reports found with this module or alias.
See doc/quickstart.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: