TROYANOSYVIRUS
Retour aux CVEs

CVE-2019-19844

CRITICAL
9.8

Description

Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)

Details CVE

Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie12/18/2019
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0

Produits affectes

canonical:ubuntu_linuxdjangoproject:django

Faiblesses (CWE)

CWE-640

References

https://docs.djangoproject.com/en/dev/releases/security/(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2020/Jan/9(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202004-17(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20200110-0003/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4224-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2020/dsa-4598(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.