Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-15105

Опубликовано: 10 июл. 2020
Источник: nvd
CVSS3: 5.4
CVSS2: 3.6
EPSS Низкий

Описание

Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authentication code. This means that the password is stored in clear text in the session for an arbitrary amount of time, and potentially forever if the user begins the login process by entering their username and password and then leaves before entering their two-factor authentication code. The severity of this issue depends on which type of session storage you have configured: in the worst case, if you're using Django's default database session storage, then users' passwords are stored in clear text in your database. In the best case, if you're using Django's signed cookie session, then users' passwords are only stored in clear text within their browser's cookie store. In the common case of using Djan

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:django_two-factor_authentication_project:django_two-factor_authentication:*:*:*:*:*:*:*:*
Версия до 1.12 (исключая)

EPSS

Процентиль: 37%
0.0016
Низкий

5.4 Medium

CVSS3

3.6 Low

CVSS2

Дефекты

CWE-312
CWE-312

Связанные уязвимости

CVSS3: 5.4
github
больше 5 лет назад

User passwords are stored in clear text in the Django session

EPSS

Процентиль: 37%
0.0016
Низкий

5.4 Medium

CVSS3

3.6 Low

CVSS2

Дефекты

CWE-312
CWE-312