Lucene search

K
githubGitHub Advisory DatabaseGHSA-7WPH-FC4W-WQP2
HistoryJul 23, 2018 - 7:51 p.m.

Moderate severity vulnerability that affects django

2018-07-2319:51:59
CWE-20
GitHub Advisory Database
github.com
3

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.132 Low

EPSS

Percentile

95.5%

The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer.

CPENameOperatorVersion
djangolt1.2.4
djangolt1.1.3

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.132 Low

EPSS

Percentile

95.5%