[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2010-4535Date: (C)2011-01-10   (M)2023-12-22


The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
SECUNIA-42715
SECUNIA-42827
SECUNIA-42913
BID-45563
ADV-2011-0048
ADV-2011-0098
FEDORA-2011-0096
FEDORA-2011-0120
USN-1040-1
http://www.openwall.com/lists/oss-security/2010/12/23/4
http://www.openwall.com/lists/oss-security/2011/01/03/5
http://code.djangoproject.com/changeset/15032
http://www.djangoproject.com/weblog/2010/dec/22/security/
https://bugzilla.redhat.com/show_bug.cgi?id=665373

CPE    10
cpe:/a:djangoproject:django:1.0
cpe:/a:djangoproject:django:1.1
cpe:/a:djangoproject:django:1.2
cpe:/a:djangoproject:django:1.3:alpha1
...
CWE    1
CWE-20
OVAL    3
oval:org.secpod.oval:def:101191
oval:org.secpod.oval:def:700219
oval:org.secpod.oval:def:101174

© SecPod Technologies