First published: Mon Feb 05 2018(Updated: )
`django.contrib.auth.forms.AuthenticationForm` in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the `confirm_login_allowed()` method, as demonstrated by discovering whether a user account is inactive.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Djangoproject Django | =1.11.8 | |
Djangoproject Django | =1.11.9 | |
Djangoproject Django | =2.0 | |
Djangoproject Django | =2.0.1 | |
Canonical Ubuntu Linux | =17.10 | |
debian/python-django | 2:2.2.28-1~deb11u2 3:3.2.19-1+deb12u1 3:4.2.16-1 | |
pip/Django | >=2.0a1<2.0.2 | 2.0.2 |
pip/django | >=1.11.8<1.11.10 | 1.11.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-6188 is high with a CVSS score of 7.5.
CVE-2018-6188 affects Django versions 1.11.8, 1.11.9, 2.0 before 2.0.2.
Remote attackers can exploit CVE-2018-6188 by leveraging data exposure from the confirm_login_allowed() method in django.contrib.auth.forms.AuthenticationForm to obtain potentially sensitive information.
Django versions 1.11.8, 1.11.9, 2.0 before 2.0.2 are affected by CVE-2018-6188.
To fix CVE-2018-6188, update Django to version 1.11.10 for versions 1.11.8 and 1.11.9, or update to version 2.0.2 for versions 2.0 before 2.0.2.