CVE-2019-19844
CRITICALDjango < 1.11.27 - Password Reset Weakness
Title source: ruleDescription
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
Exploits (5)
exploitdb
WORKING POC
VERIFIED
by Ryuji Tsutsui · webappspython
https://www.exploit-db.com/exploits/47879
github
WRITEUP
3 stars
by HxDDD · poc
https://github.com/HxDDD/CVE-PoC/tree/main/Django/(Password bypass) CVE-2019-19844.md
References (10)
Scores
CVSS v3
9.8
EPSS
0.1397
EPSS Percentile
94.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-640
Status
published
Products (7)
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
19.04
canonical/ubuntu_linux
19.10
djangoproject/django
3.0
djangoproject/django
< 1.11.27
pypi/Django
0 - 1.11.27PyPI
Published
Dec 18, 2019
Tracked Since
Feb 18, 2026