logo

CVE-2010-4535 django

Package

Manager: pip
Name: django
Vulnerable Version: >=0 <1.1.3 || >=1.2 <1.2.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U

EPSS: 0.04746 pctl0.89006

Details

Improper date handling in Django The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer.

Metadata

Created: 2018-07-23T19:51:59Z
Modified: 2024-09-17T15:03:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/07/GHSA-7wph-fc4w-wqp2/GHSA-7wph-fc4w-wqp2.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-7wph-fc4w-wqp2
Finding: F184
Auto approve: 1