First published: Mon Mar 17 2025(Updated: )
Diego Cebrián discovered that djoser did not properly handle user authentication. An attacker with valid credentials could possibly use this to bypass authentication checks, such as two-factor authentication, to gain unintended access.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python3-djoser | <2.1.0-1ubuntu0.24.10.1 | 2.1.0-1ubuntu0.24.10.1 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/python3-djoser | <2.1.0-1ubuntu0.24.04.1 | 2.1.0-1ubuntu0.24.04.1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/python3-djoser | <2.1.0-1ubuntu0.22.04.1 | 2.1.0-1ubuntu0.22.04.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/python3-djoser | <2.0.3-1ubuntu0.1~esm1 | 2.0.3-1ubuntu0.1~esm1 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7354-1 is significant due to the potential for attackers to bypass critical authentication mechanisms.
To fix USN-7354-1, upgrade the python3-djoser package to the recommended versions specified in the advisory.
The impact of USN-7354-1 includes unauthorized access by attackers who may bypass two-factor authentication using valid credentials.
The vulnerability reported in USN-7354-1 was discovered by researcher Diego Cebrián.
USN-7354-1 affects Ubuntu versions 20.04, 22.04, and 24.04 with specific python3-djoser package versions.