Логотип exploitDog
bind:CVE-2020-15105
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-15105

Количество 2

Количество 2

nvd логотип

CVE-2020-15105

больше 5 лет назад

Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authentication code. This means that the password is stored in clear text in the session for an arbitrary amount of time, and potentially forever if the user begins the login process by entering their username and password and then leaves before entering their two-factor authentication code. The severity of this issue depends on which type of session storage you have configured: in the worst case, if you're using Django's default database session storage, then users' passwords are stored in clear text in your database. In the best case, if you're using Django's signed cookie session, then users' passwords are only stored in clear text within their browser's cookie store. In the common case of using Djan

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-vhr6-pvjm-9qwf

больше 5 лет назад

User passwords are stored in clear text in the Django session

CVSS3: 5.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-15105

Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authentication code. This means that the password is stored in clear text in the session for an arbitrary amount of time, and potentially forever if the user begins the login process by entering their username and password and then leaves before entering their two-factor authentication code. The severity of this issue depends on which type of session storage you have configured: in the worst case, if you're using Django's default database session storage, then users' passwords are stored in clear text in your database. In the best case, if you're using Django's signed cookie session, then users' passwords are only stored in clear text within their browser's cookie store. In the common case of using Djan

CVSS3: 5.4
0%
Низкий
больше 5 лет назад
github логотип
GHSA-vhr6-pvjm-9qwf

User passwords are stored in clear text in the Django session

CVSS3: 5.4
0%
Низкий
больше 5 лет назад

Уязвимостей на страницу