Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2042-1 | python-django security update |
Debian DLA |
DLA-2233-1 | python-django security update |
Debian DSA |
DSA-4598-1 | python-django security update |
Github GHSA |
GHSA-vfq6-hq5r-27r6 | Django Potential account hijack via password reset form |
Ubuntu USN |
USN-4224-1 | Django vulnerability |
Ubuntu USN |
USN-6722-1 | Django vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:25:12.834Z
Reserved: 2019-12-17T00:00:00
Link: CVE-2019-19844
No data.
Status : Modified
Published: 2019-12-18T19:15:11.780
Modified: 2024-11-21T04:35:30.833
Link: CVE-2019-19844
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Github GHSA
Ubuntu USN