CVE-2018-16984

An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.
Configurations

Configuration 1 (hide)

cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:53

Type Values Removed Values Added
References () http://www.securitytracker.com/id/1041749 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041749 - Third Party Advisory, VDB Entry
References () https://security.netapp.com/advisory/ntap-20190502-0009/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20190502-0009/ - Third Party Advisory
References () https://www.djangoproject.com/weblog/2018/oct/01/security-release/ - Vendor Advisory () https://www.djangoproject.com/weblog/2018/oct/01/security-release/ - Vendor Advisory

Information

Published : 2018-10-02 18:29

Updated : 2024-11-21 03:53


NVD link : CVE-2018-16984

Mitre link : CVE-2018-16984

CVE.ORG link : CVE-2018-16984


JSON object : View

Products Affected

djangoproject

  • django
CWE
CWE-522

Insufficiently Protected Credentials