Skip to content

Django allows unprivileged users to read the password hashes of arbitrary accounts

Moderate severity GitHub Reviewed Published Oct 3, 2018 to the GitHub Advisory Database • Updated Apr 1, 2024

Package

pip django (pip)

Affected versions

>= 2.1, < 2.1.2

Patched versions

2.1.2

Description

An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.

References

Published to the GitHub Advisory Database Oct 3, 2018
Reviewed Jun 16, 2020
Last updated Apr 1, 2024

Severity

Moderate
4.9
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
High
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

Weaknesses

CVE ID

CVE-2018-16984

GHSA ID

GHSA-6mx3-3vqg-hpp2

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.