TROYANOSYVIRUS
Back to CVEs

CVE-2019-19844

CRITICAL
9.8

Description

Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)

CVE Details

CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published12/18/2019
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

canonical:ubuntu_linuxdjangoproject:django

Weaknesses (CWE)

CWE-640

References

https://docs.djangoproject.com/en/dev/releases/security/(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2020/Jan/9(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202004-17(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20200110-0003/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4224-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2020/dsa-4598(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.