CVE-2019-19844
high-risk
Published 2019-12-18
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
Do I need to act?
!
14.0% chance of exploitation in next 30 days
EPSS score — higher than 86% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
+
Fix available
Upgrade to: 358973a12eb3105ba084a2d594428a19223b8582, c494d90c195a739a7298b073eaa6ed987c2fd0bc
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (6)
Affected Vendors
References (20)
Vendor Advisory
https://docs.djangoproject.com/en/dev/releases/security/
Third Party Advisory
https://usn.ubuntu.com/4224-1/
Vendor Advisory
https://docs.djangoproject.com/en/dev/releases/security/
Third Party Advisory
https://usn.ubuntu.com/4224-1/
64
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
19/34 · Moderate
Exposure
13/34 · Low