Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-19844

Опубликовано: 18 дек. 2019
Источник: redhat
CVSS3: 9.8
EPSS Средний

Описание

Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)

A flaw was found in Django where it did not sanitize the email input from the password recovery form. An attacker with the knowledge of the victim user’s email address could use this flaw to reset the victim user’s password and retrieve the reset link to gain access and take over their account.

Отчет

This flaw depends upon the use of Django's password reset functionality. The following products ship the flawed code but do not use this functionality:

  • Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3
  • Red Hat Gluster Storage 3
  • Red Hat Certified Cloud and Service Provider Certification 1
  • Red Hat OpenStack Platform, all versions. No updates will be provided at this time for the RHOSP django package.
  • Red Hat Satellite 6, all versions
  • Red Hat Update Infrastructure 3

Меры по смягчению последствий

Unless the password-reset form is disabled, this flaw can only be resolved by applying updates.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 2calamari-serverWill not fix
Red Hat Ceph Storage 2python-djangoAffected
Red Hat Ceph Storage 3python-djangoAffected
Red Hat Certification for Red Hat Enterprise Linux 7python-djangoAffected
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo)python-djangoOut of support scope
Red Hat OpenStack Platform 10 (Newton)python-djangoOut of support scope
Red Hat OpenStack Platform 13 (Queens)python-djangoWill not fix
Red Hat OpenStack Platform 14 (Rocky)python-djangoOut of support scope
Red Hat OpenStack Platform 15 (Stein)python-djangoWill not fix
Red Hat OpenStack Platform 16 (Train)python-djangoWill not fix

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-290
https://bugzilla.redhat.com/show_bug.cgi?id=1788425Django: crafted email address allows account takeover

EPSS

Процентиль: 94%
0.12612
Средний

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 5 лет назад

Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)

CVSS3: 9.8
nvd
больше 5 лет назад

Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)

CVSS3: 9.8
debian
больше 5 лет назад

Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows a ...

CVSS3: 9.8
github
больше 5 лет назад

Django Potential account hijack via password reset form

CVSS3: 7.5
fstec
больше 5 лет назад

Уязвимость фреймворка для веб-приложений Django, связанная с ошибкой в работе механизма восстановления паролей, позволяющая нарушителю оказать воздействие на целостность данных

EPSS

Процентиль: 94%
0.12612
Средний

9.8 Critical

CVSS3

Уязвимость CVE-2019-19844