CVE-2019-19844

CRITICAL

Django < 1.11.27 - Password Reset Weakness

Title source: rule

Description

Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)

Exploits (5)

exploitdb WORKING POC VERIFIED
by Ryuji Tsutsui · webappspython
https://www.exploit-db.com/exploits/47879
nomisec WORKING POC 100 stars
by ryu22e · poc
https://github.com/ryu22e/django_cve_2019_19844_poc
nomisec WORKING POC 8 stars
by andripwn · poc
https://github.com/andripwn/django_cve201919844
nomisec WORKING POC 4 stars
by 0xsha · poc
https://github.com/0xsha/CVE_2019_19844
github WRITEUP 3 stars
by HxDDD · poc
https://github.com/HxDDD/CVE-PoC/tree/main/Django/(Password bypass) CVE-2019-19844.md

Scores

CVSS v3 9.8
EPSS 0.1397
EPSS Percentile 94.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-640
Status published
Products (7)
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 19.04
canonical/ubuntu_linux 19.10
djangoproject/django 3.0
djangoproject/django < 1.11.27
pypi/Django 0 - 1.11.27PyPI
Published Dec 18, 2019
Tracked Since Feb 18, 2026