The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer.
2011-01-10T20:00:16.937
2025-04-11T00:51:21.963
Deferred
CVSSv2: 5.0 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | djangoproject | django | ≤ 1.1.2 | Yes |
Application | djangoproject | django | 0.91 | Yes |
Application | djangoproject | django | 0.95 | Yes |
Application | djangoproject | django | 0.95.1 | Yes |
Application | djangoproject | django | 0.96 | Yes |
Application | djangoproject | django | 1.0 | Yes |
Application | djangoproject | django | 1.0.1 | Yes |
Application | djangoproject | django | 1.0.2 | Yes |
Application | djangoproject | django | 1.1 | Yes |
Application | djangoproject | django | 1.1.0 | Yes |
Application | djangoproject | django | 1.2 | Yes |
Application | djangoproject | django | 1.2.1 | Yes |
Application | djangoproject | django | 1.2.2 | Yes |
Application | djangoproject | django | 1.2.3 | Yes |
Application | djangoproject | django | 1.3 | Yes |
Application | djangoproject | django | 1.3 | Yes |