Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-21543

Опубликовано: 13 дек. 2024
Источник: debian
EPSS Низкий

Описание

Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when the authenticate() function fails. This is because the system falls back to querying the database directly, granting access to users with valid credentials, and eventually bypassing custom authentication checks such as two-factor authentication, LDAP validations, or requirements from configured AUTHENTICATION_BACKENDS.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
djoserfixed2.3.1-1package
djoserfixed2.1.0-1+deb12u1bookwormpackage

Примечания

  • https://github.com/sunscrapers/djoser/issues/795

  • https://github.com/sunscrapers/djoser/pull/819

  • https://github.com/sunscrapers/djoser/commit/d33c3993c0c735f23cbedc60fa59fce69354f19d (2.3.0)

EPSS

Процентиль: 37%
0.00159
Низкий

Связанные уязвимости

CVSS3: 7.1
ubuntu
около 1 года назад

Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when the authenticate() function fails. This is because the system falls back to querying the database directly, granting access to users with valid credentials, and eventually bypassing custom authentication checks such as two-factor authentication, LDAP validations, or requirements from configured AUTHENTICATION_BACKENDS.

CVSS3: 7.1
nvd
около 1 года назад

Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when the authenticate() function fails. This is because the system falls back to querying the database directly, granting access to users with valid credentials, and eventually bypassing custom authentication checks such as two-factor authentication, LDAP validations, or requirements from configured AUTHENTICATION_BACKENDS.

CVSS3: 7.1
github
около 1 года назад

djoser Authentication Bypass

EPSS

Процентиль: 37%
0.00159
Низкий