CVE-2019-19844

Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:3.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*

History

21 Nov 2024, 04:35

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html - () http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html -
References () https://docs.djangoproject.com/en/dev/releases/security/ - Vendor Advisory () https://docs.djangoproject.com/en/dev/releases/security/ - Vendor Advisory
References () https://groups.google.com/forum/#%21topic/django-announce/3oaB2rVH3a0 - () https://groups.google.com/forum/#%21topic/django-announce/3oaB2rVH3a0 -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/ -
References () https://seclists.org/bugtraq/2020/Jan/9 - () https://seclists.org/bugtraq/2020/Jan/9 -
References () https://security.gentoo.org/glsa/202004-17 - () https://security.gentoo.org/glsa/202004-17 -
References () https://security.netapp.com/advisory/ntap-20200110-0003/ - () https://security.netapp.com/advisory/ntap-20200110-0003/ -
References () https://usn.ubuntu.com/4224-1/ - Third Party Advisory () https://usn.ubuntu.com/4224-1/ - Third Party Advisory
References () https://www.debian.org/security/2020/dsa-4598 - () https://www.debian.org/security/2020/dsa-4598 -
References () https://www.djangoproject.com/weblog/2019/dec/18/security-releases/ - Vendor Advisory () https://www.djangoproject.com/weblog/2019/dec/18/security-releases/ - Vendor Advisory

07 Nov 2023, 03:07

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/', 'name': 'FEDORA-2020-adb4f0143a', 'tags': [], 'refsource': 'FEDORA'}
  • {'url': 'https://groups.google.com/forum/#!topic/django-announce/3oaB2rVH3a0', 'name': 'https://groups.google.com/forum/#!topic/django-announce/3oaB2rVH3a0', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • () https://groups.google.com/forum/#%21topic/django-announce/3oaB2rVH3a0 -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/ -

Information

Published : 2019-12-18 19:15

Updated : 2024-11-21 04:35


NVD link : CVE-2019-19844

Mitre link : CVE-2019-19844

CVE.ORG link : CVE-2019-19844


JSON object : View

Products Affected

canonical

  • ubuntu_linux

djangoproject

  • django
CWE
CWE-640

Weak Password Recovery Mechanism for Forgotten Password