Vulnerability Name: | CVE-2018-16984 (CCN-150668) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2018-10-01 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2018-10-01 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2019-10-03 | ||||||||||||||||||||||||||||||||||||||||
Summary: | An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 4.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N) 4.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-522 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-16984 Source: CCN Type: SECTRACK ID: 1041749 Django Password Change Flaw Lets Remote Authenticated Administrative Users View Hashed Passwords on the Target System Source: SECTRACK Type: Third Party Advisory, VDB Entry 1041749 Source: XF Type: UNKNOWN django-cve201816984-info-disc(150668) Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20190502-0009/ Source: CCN Type: Django Web site Django security release issued: 2.1.2 Source: CONFIRM Type: Vendor Advisory https://www.djangoproject.com/weblog/2018/oct/01/security-release/ | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |