[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

py-django: Potential account hijack via password reset form (CVE-2019-19844)

ID: oval:org.secpod.oval:def:1801654Date: (C)2019-12-30   (M)2023-11-10
Class: PATCHFamily: unix




By submitting a suitably crafted email address making use of Unicode characters, that compared equal to an existing user email when lower-cased for comparison, an attacker could be sent a password reset token for the matched account.changed the description 4 times within 10 minutes changed the descriptionmade the issue visible to everyone

Platform:
Alpine Linux 3.10
Alpine Linux 3.11
Alpine Linux 3.8
Alpine Linux 3.9
Product:
py3-django
Reference:
11053
CVE-2019-19844
CVE    1
CVE-2019-19844

© SecPod Technologies