CVE-2024-39329: Django vulnerable to user enumeration attack
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.contrib.auth.backends.ModelBackend.authenticate()
method allows remote attackers to enumerate users via a timing attack involving login requests for users with an unusable password.
References
- docs.djangoproject.com/en/dev/releases/security
- github.com/advisories/GHSA-x7q2-wr7g-xqmf
- github.com/django/django
- github.com/django/django/commit/07cefdee4a9d1fcd9a3a631cbd07c78defd1923b
- github.com/django/django/commit/156d3186c96e3ec2ca73b8b25dc2ef366e38df14
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-57.yaml
- groups.google.com/forum/
- nvd.nist.gov/vuln/detail/CVE-2024-39329
- www.djangoproject.com/weblog/2024/jul/09/security-releases
Detect and mitigate CVE-2024-39329 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →