Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2042-1 | python-django security update |
![]() |
DLA-2233-1 | python-django security update |
![]() |
DSA-4598-1 | python-django security update |
![]() |
GHSA-vfq6-hq5r-27r6 | Django Potential account hijack via password reset form |
![]() |
USN-4224-1 | Django vulnerability |
![]() |
USN-6722-1 | Django vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:25:12.834Z
Reserved: 2019-12-17T00:00:00
Link: CVE-2019-19844

No data.

Status : Modified
Published: 2019-12-18T19:15:11.780
Modified: 2024-11-21T04:35:30.833
Link: CVE-2019-19844


No data.