First published: Wed Dec 18 2019(Updated: )
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/python-django | <=1:1.11.23-1~deb10u1<=1:1.10.7-2+deb9u6 | 2:2.2.9-1 2:3.0.1-1 1:1.11.27-1~deb10u1 1:1.10.7-2+deb9u7 |
debian/2:2.2.8-1 | ||
Djangoproject Django | <1.11.27 | |
Djangoproject Django | >=2.2<2.2.9 | |
Djangoproject Django | =3.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Canonical Ubuntu Linux | =19.10 | |
debian/python-django | 2:2.2.28-1~deb11u2 3:3.2.19-1+deb12u1 3:4.2.16-1 | |
pip/Django | >=3.0<3.0.1 | 3.0.1 |
pip/Django | >=2.0<2.2.9 | 2.2.9 |
pip/django | <1.11.27 | 1.11.27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-19844.
The severity of CVE-2019-19844 is critical with a CVSS score of 9.8.
The affected software for CVE-2019-19844 is Django versions before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1.
CVE-2019-19844 allows an account takeover by using a suitably crafted email address that matches an existing user's email address after case transformation of Unicode characters, allowing the attacker to receive a password reset token for the matched user.
Yes, the fix for CVE-2019-19844 is to upgrade Django to version 1.11.27, 2.2.9, or 3.0.1, depending on the version you are using.