Weak Password Recovery Mechanism for Forgotten Password

Affecting python-django package, versions <1.8.7-1ubuntu5.11

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

NVD Description

Note: Versions mentioned in the description apply to the upstream python-django package. See Remediation section below for Ubuntu:16.04 relevant versions.

Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)

Remediation

Upgrade Ubuntu:16.04 python-django to version 1.8.7-1ubuntu5.11 or higher.

References

CVSS Score

9.8
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F
CVE
CVE-2019-19844
CWE
CWE-640
Snyk ID
SNYK-UBUNTU1604-PYTHONDJANGO-538296
Disclosed
18 Dec, 2019
Published
18 Dec, 2019