Weak Password Recovery Mechanism for Forgotten Password Affecting python-django package, versions <1.8.7-1ubuntu5.11
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UBUNTU1604-PYTHONDJANGO-538296
- published 18 Dec 2019
- disclosed 18 Dec 2019
Introduced: 18 Dec 2019
CVE-2019-19844 Open this link in a new tabHow to fix?
Upgrade Ubuntu:16.04
python-django
to version 1.8.7-1ubuntu5.11 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-django
package and not the python-django
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:16.04
relevant fixed versions and status.
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)