Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-19844 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software Subscribe |
py-django (Alpine package) Operating systems & Components / Operating system package or component py3-django (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU23667
Risk: High
CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-19844
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to hijack another user account.
The vulnerability exists due to insufficient validation of user-supplied input when processing email addresses passed via the password reset form. A remote attacker with knowledge of a valid email address can use a specially crafted email that after Unicode transformation will be treated as the victim's email address and reset password for the victim's account to the attacker provided email address.
Install update from vendor's website.
Vulnerable software versionspy-django (Alpine package): 1.7-r0 - 1.11.23-r2
py3-django (Alpine package): 1.11.23-r2
py3-django (Alpine package):
External linkshttp://git.alpinelinux.org/aports/commit/?id=bf781eafc1b4129d2ec86c3aec0762934678d52f
http://git.alpinelinux.org/aports/commit/?id=6325592173cbeb85e408e522b379427c261a5e81
http://git.alpinelinux.org/aports/commit/?id=ba5bb4ce8d9a7670ec346bcbae065887dc50f5d3
http://git.alpinelinux.org/aports/commit/?id=731de66686d43f91b9dcf733ba91acc55958879d
http://git.alpinelinux.org/aports/commit/?id=0a61f467253f16ad94147ac4b2a312d3757f376f
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.