CVE-2016-2513: Django User Enumeration Vulnerability
(updated )
The password hasher in contrib/auth/hashers.py
in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests.
References
- github.com/advisories/GHSA-fp6p-5xvw-m74f
- github.com/django/django
- github.com/django/django/commit/67b46ba7016da2d259c1ecc7d666d11f5e1cfaab
- github.com/django/django/commit/af7d09b0c5c6ab68e629fd9baf736f9dd203b18e
- github.com/django/django/commit/f4e6e02f7713a6924d16540be279909ff4091eb6
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2016-16.yaml
- nvd.nist.gov/vuln/detail/CVE-2016-2513
- web.archive.org/web/20160322001143/http://www.securitytracker.com/id/1035152
- web.archive.org/web/20200228001222/http://www.securityfocus.com/bid/83878
- www.djangoproject.com/weblog/2016/mar/01/security-releases
Detect and mitigate CVE-2016-2513 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →