Description
Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when the authenticate() function fails. This is because the system falls back to querying the database directly, granting access to users with valid credentials, and eventually bypassing custom authentication checks such as two-factor authentication, LDAP validations, or requirements from configured AUTHENTICATION_BACKENDS.
Published: 2024-12-13
Score: 5.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4060-1 djoser security update
EUVD EUVD EUVD-2024-0205 Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when the authenticate() function fails. This is because the system falls back to querying the database directly, granting access to users with valid credentials, and eventually bypassing custom authentication checks such as two-factor authentication, LDAP validations, or requirements from configured AUTHENTICATION_BACKENDS.
Github GHSA Github GHSA GHSA-v49p-m6gh-747c djoser Authentication Bypass
Ubuntu USN Ubuntu USN USN-7354-1 djoser vulnerability
History

Thu, 20 Feb 2025 22:45:00 +0000

Type Values Removed Values Added
References

Fri, 13 Dec 2024 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-295
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Dec 2024 05:15:00 +0000

Type Values Removed Values Added
Description Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when the authenticate() function fails. This is because the system falls back to querying the database directly, granting access to users with valid credentials, and eventually bypassing custom authentication checks such as two-factor authentication, LDAP validations, or requirements from configured AUTHENTICATION_BACKENDS.
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:P'}

cvssV4_0

{'score': 5.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2025-02-20T22:02:38.155Z

Reserved: 2023-12-22T12:33:20.124Z

Link: CVE-2024-21543

cve-icon Vulnrichment

Updated: 2025-02-20T22:02:38.155Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-13T05:15:07.653

Modified: 2025-02-20T22:15:30.670

Link: CVE-2024-21543

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses