CVE-2019-19844

high-risk
Published 2019-12-18

Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)

Do I need to act?

!
14.0% chance of exploitation in next 30 days
EPSS score — higher than 86% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
+
Fix available
Upgrade to: 358973a12eb3105ba084a2d594428a19223b8582, c494d90c195a739a7298b073eaa6ed987c2fd0bc
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

Affected Vendors

64
/ 100
high-risk
Severity 32/34 · Critical
Exploitability 19/34 · Moderate
Exposure 13/34 · Low