First published: Tue Oct 02 2018(Updated: )
An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/django | >=2.1<2.1.2 | 2.1.2 |
Djangoproject Django | >=2.1<2.1.2 | |
>=2.1<2.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-16984 is medium with a severity value of 4.9.
CVE-2018-16984 affects Django versions before 2.1.2.
Unprivileged users can exploit CVE-2018-16984 to read the password hashes of arbitrary accounts.
Yes, the fix for CVE-2018-16984 is to update Django to version 2.1.2 or later.
Yes, here are some references for CVE-2018-16984: - [NVD](https://nvd.nist.gov/vuln/detail/CVE-2018-16984) - [GitHub Advisory](https://github.com/advisories/GHSA-6mx3-3vqg-hpp2) - [NetApp Security Advisory](https://security.netapp.com/advisory/ntap-20190502-0009/)