Description
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2042-1 | python-django security update |
Debian DLA |
DLA-2233-1 | python-django security update |
Debian DSA |
DSA-4598-1 | python-django security update |
Github GHSA |
GHSA-vfq6-hq5r-27r6 | Django Potential account hijack via password reset form |
Ubuntu USN |
USN-4224-1 | Django vulnerability |
Ubuntu USN |
USN-6722-1 | Django vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:25:12.834Z
Reserved: 2019-12-17T00:00:00.000Z
Link: CVE-2019-19844
No data.
Status : Modified
Published: 2019-12-18T19:15:11.780
Modified: 2024-11-21T04:35:30.833
Link: CVE-2019-19844
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Github GHSA
Ubuntu USN