CVE-2019-19844

Published: 18 December 2019

Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)

Priority

High

CVSS 3 base score: 9.8

Status

Package Release Status
python-django
Launchpad, Ubuntu, Debian
Upstream
Released (1.11.27, 2.2.9)
Ubuntu 20.04 LTS (Focal Fossa)
Released (2:2.2.9-2ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (1:1.11.11-1ubuntu1.6)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (1.8.7-1ubuntu5.11)
Ubuntu 14.04 ESM (Trusty Tahr) Needs triage

Ubuntu 12.04 ESM (Precise Pangolin) Does not exist

Patches:
Upstream: https://github.com/django/django/commit/f4cff43bf921fcea6a29b726eb66767f67753fa2 (1.11.x)
Upstream: https://github.com/django/django/commit/4d334bea06cac63dc1272abcec545b85136cca0e (2.2.x)