Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-32879
HistoryApr 24, 2024 - 7:42 p.m.

CVE-2024-32879 social-auth-app-django Improper Handling of Case Sensitivity vulnerability

2024-04-2419:42:14
CWE-303
CWE-178
GitHub_M
www.cve.org
cve-2024
social-auth-app-django
improper handling
case sensitivity
python
mysql
mariadb
collation
vulnerability

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N

5.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

Python Social Auth is a social authentication/registration mechanism. Prior to version 5.4.1, due to default case-insensitive collation in MySQL or MariaDB databases, third-party authentication user IDs are not case-sensitive and could cause different IDs to match. This issue has been addressed by a fix released in version 5.4.1. An immediate workaround would be to change collation of the affected field.

CNA Affected

[
  {
    "vendor": "python-social-auth",
    "product": "social-app-django",
    "versions": [
      {
        "version": "< 5.4.1",
        "status": "affected"
      }
    ]
  }
]

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N

5.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%