Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix 2FA bypass via password reset #3715

Merged

Conversation

into-the-v0id
Copy link
Contributor

Fixes #3714

This PR changes the behavior of the password reset endpoint, so that it wont authenticate the user after a successful password reset.

In order to not introduce braking changes, the password reset endpoint will still return a Login Response but now without a JWT. That way Lemmy UI will just redirect to unauthenticated home after a successful password reset.

@into-the-v0id into-the-v0id force-pushed the bugfix/2fa-bypass-using-password-reset branch from 6987edb to 967d9ff Compare July 25, 2023 15:12
Copy link
Member

@dessalines dessalines left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I spose this is fine... I didn't know this was the standard for other sites, that 2FA is supposed to also keep you safe from your email account getting compromised.

@dessalines dessalines enabled auto-merge (squash) July 25, 2023 16:54
@dessalines dessalines merged commit cf2229d into LemmyNet:main Jul 25, 2023
1 check passed
Nutomic pushed a commit that referenced this pull request Jul 26, 2023
Co-authored-by: Dessalines <dessalines@users.noreply.github.com>
@into-the-v0id into-the-v0id deleted the bugfix/2fa-bypass-using-password-reset branch July 29, 2023 11:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[Bug]: 2FA bypass using password reset
2 participants