Логотип exploitDog
bind:CVE-2024-21543
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-21543

Количество 4

Количество 4

ubuntu логотип

CVE-2024-21543

около 1 года назад

Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when the authenticate() function fails. This is because the system falls back to querying the database directly, granting access to users with valid credentials, and eventually bypassing custom authentication checks such as two-factor authentication, LDAP validations, or requirements from configured AUTHENTICATION_BACKENDS.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2024-21543

около 1 года назад

Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when the authenticate() function fails. This is because the system falls back to querying the database directly, granting access to users with valid credentials, and eventually bypassing custom authentication checks such as two-factor authentication, LDAP validations, or requirements from configured AUTHENTICATION_BACKENDS.

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2024-21543

около 1 года назад

Versions of the package djoser before 2.3.0 are vulnerable to Authenti ...

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-v49p-m6gh-747c

около 1 года назад

djoser Authentication Bypass

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-21543

Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when the authenticate() function fails. This is because the system falls back to querying the database directly, granting access to users with valid credentials, and eventually bypassing custom authentication checks such as two-factor authentication, LDAP validations, or requirements from configured AUTHENTICATION_BACKENDS.

CVSS3: 7.1
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-21543

Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when the authenticate() function fails. This is because the system falls back to querying the database directly, granting access to users with valid credentials, and eventually bypassing custom authentication checks such as two-factor authentication, LDAP validations, or requirements from configured AUTHENTICATION_BACKENDS.

CVSS3: 7.1
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-21543

Versions of the package djoser before 2.3.0 are vulnerable to Authenti ...

CVSS3: 7.1
0%
Низкий
около 1 года назад
github логотип
GHSA-v49p-m6gh-747c

djoser Authentication Bypass

CVSS3: 7.1
0%
Низкий
около 1 года назад

Уязвимостей на страницу