Weak Password Recovery Mechanism for Forgotten Password Affecting python-django package, versions <1:1.11.11-1ubuntu1.6
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UBUNTU1804-PYTHONDJANGO-538295
- published 18 Dec 2019
- disclosed 18 Dec 2019
Introduced: 18 Dec 2019
CVE-2019-19844 Open this link in a new tabHow to fix?
Upgrade Ubuntu:18.04
python-django
to version 1:1.11.11-1ubuntu1.6 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-django
package and not the python-django
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:18.04
relevant fixed versions and status.
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)