First published: Thu Dec 19 2019(Updated: )
Simon Charette discovered that the password reset functionality in Django used a Unicode case insensitive query to retrieve accounts associated with an email address. An attacker could possibly use this to obtain password reset tokens and hijack accounts.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python-django | <1:1.11.22-1ubuntu1.1 | 1:1.11.22-1ubuntu1.1 |
Ubuntu Linux | =19.10 | |
All of | ||
ubuntu/python3-django | <1:1.11.22-1ubuntu1.1 | 1:1.11.22-1ubuntu1.1 |
Ubuntu Linux | =19.10 | |
All of | ||
ubuntu/python-django | <1:1.11.20-1ubuntu0.3 | 1:1.11.20-1ubuntu0.3 |
Ubuntu Linux | =19.04 | |
All of | ||
ubuntu/python3-django | <1:1.11.20-1ubuntu0.3 | 1:1.11.20-1ubuntu0.3 |
Ubuntu Linux | =19.04 | |
All of | ||
ubuntu/python-django | <1:1.11.11-1ubuntu1.6 | 1:1.11.11-1ubuntu1.6 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/python3-django | <1:1.11.11-1ubuntu1.6 | 1:1.11.11-1ubuntu1.6 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/python-django | <1.8.7-1ubuntu5.11 | 1.8.7-1ubuntu5.11 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/python3-django | <1.8.7-1ubuntu5.11 | 1.8.7-1ubuntu5.11 |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Django vulnerability is CVE-2019-19844.
The severity of CVE-2019-19844 is not specified.
The password reset functionality in Django used a Unicode case insensitive query to retrieve accounts associated with an email address, allowing attackers to obtain password reset tokens and hijack accounts.
The affected versions of Django are 1.11.22-1ubuntu1.1, 1.11.20-1ubuntu0.3, 1.11.11-1ubuntu1.6, and 1.8.7-1ubuntu5.11.
To fix the Django vulnerability in CVE-2019-19844, update the python-django or python3-django package to version 1.11.22-1ubuntu1.1 or higher.