DescriptionDjango before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
Overall state of this security issue: Pending
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
|National Vulnerability Database||SUSE|
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|HPE Helion OpenStack 8||python-Django||Affected|
|SUSE Openstack Cloud 6||python-Django||Unsupported|
|SUSE Openstack Cloud 7||python-Django||Affected|
|SUSE Openstack Cloud 8||python-Django||Affected|
|SUSE Openstack Cloud 9||python-Django1||Affected|
|SUSE Storage 4||python-Django||Unsupported|
|SUSE Storage 5||python-Django||Affected|