CVE-2024-22513: Improper Privilege Management in djangorestframework-simplejwt
(updated )
djangorestframework-simplejwt before version 5.5.1 is vulnerable to information disclosure. A user can access web application resources even after their account has been disabled due to missing user validation checks via the for_user method.
References
- github.com/advisories/GHSA-5vcc-86wm-547q
- github.com/dmdhrumilmistry/CVEs/tree/main/CVE-2024-22513
- github.com/jazzband/djangorestframework-simplejwt
- github.com/jazzband/djangorestframework-simplejwt/blob/c791e987332ed5e22a86428160d6372b1d85ffae/rest_framework_simplejwt/tokens.py
- github.com/jazzband/djangorestframework-simplejwt/commit/14e8b2cf5fa0df954af82ff3926fa6d6c4ecf13e
- github.com/jazzband/djangorestframework-simplejwt/commit/1ad763bfe73936515aa4756263338c63866364c9
- github.com/jazzband/djangorestframework-simplejwt/commit/a2d0a0201b6123536ecf76cd4d0ec7389317d0a7
- github.com/jazzband/djangorestframework-simplejwt/issues/779
- github.com/jazzband/djangorestframework-simplejwt/pull/872
- github.com/jazzband/djangorestframework-simplejwt/pull/873
- github.com/jazzband/djangorestframework-simplejwt/pull/891
- nvd.nist.gov/vuln/detail/CVE-2024-22513
Code Behaviors & Features
Detect and mitigate CVE-2024-22513 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →