Search for vulnerabilities
Vulnerability details: VCID-ahju-7yv8-aaaq
Vulnerability ID VCID-ahju-7yv8-aaaq
Aliases BIT-django-2024-39329
CVE-2024-39329
GHSA-x7q2-wr7g-xqmf
PYSEC-2024-57
Summary An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.contrib.auth.backends.ModelBackend.authenticate() method allows remote attackers to enumerate users via a timing attack involving login requests for users with an unusable password.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 3.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39329.json
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.004 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.004 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.004 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.004 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.004 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.004 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.004 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.004 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.004 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.004 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.004 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.004 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.004 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.004 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.004 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
epss 0.0136 https://api.first.org/data/v1/epss?cve=CVE-2024-39329
cvssv3.1 3.7 https://docs.djangoproject.com/en/dev/releases/security
generic_textual MODERATE https://docs.djangoproject.com/en/dev/releases/security
generic_textual Medium https://docs.djangoproject.com/en/dev/releases/security/
cvssv3.1 5.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-x7q2-wr7g-xqmf
cvssv3.1 3.7 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 5.3 https://github.com/django/django/commit/07cefdee4a9d1fcd9a3a631cbd07c78defd1923b
generic_textual MODERATE https://github.com/django/django/commit/07cefdee4a9d1fcd9a3a631cbd07c78defd1923b
cvssv3.1 5.3 https://github.com/django/django/commit/156d3186c96e3ec2ca73b8b25dc2ef366e38df14
generic_textual MODERATE https://github.com/django/django/commit/156d3186c96e3ec2ca73b8b25dc2ef366e38df14
cvssv3.1 5.3 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-57.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-57.yaml
cvssv3.1 3.7 https://groups.google.com/forum/#%21forum/django-announce
generic_textual MODERATE https://groups.google.com/forum/#%21forum/django-announce
cvssv3.1 7.5 https://www.djangoproject.com/weblog/2024/jul/09/security-releases
generic_textual HIGH https://www.djangoproject.com/weblog/2024/jul/09/security-releases
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39329.json
https://api.first.org/data/v1/epss?cve=CVE-2024-39329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39329
https://docs.djangoproject.com/en/dev/releases/security
https://docs.djangoproject.com/en/dev/releases/security/
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/django/django
https://github.com/django/django/commit/07cefdee4a9d1fcd9a3a631cbd07c78defd1923b
https://github.com/django/django/commit/156d3186c96e3ec2ca73b8b25dc2ef366e38df14
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-57.yaml
https://groups.google.com/forum/#%21forum/django-announce
https://www.djangoproject.com/weblog/2024/jul/09/security-releases
https://www.djangoproject.com/weblog/2024/jul/09/security-releases/
1076069 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076069
2295936 https://bugzilla.redhat.com/show_bug.cgi?id=2295936
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
CVE-2024-39329 https://nvd.nist.gov/vuln/detail/CVE-2024-39329
GHSA-x7q2-wr7g-xqmf https://github.com/advisories/GHSA-x7q2-wr7g-xqmf
RHSA-2024:8906 https://access.redhat.com/errata/RHSA-2024:8906
RHSA-2024:9481 https://access.redhat.com/errata/RHSA-2024:9481
USN-6888-1 https://usn.ubuntu.com/6888-1/
USN-6888-2 https://usn.ubuntu.com/6888-2/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39329.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://docs.djangoproject.com/en/dev/releases/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django/commit/07cefdee4a9d1fcd9a3a631cbd07c78defd1923b
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django/commit/156d3186c96e3ec2ca73b8b25dc2ef366e38df14
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-57.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://groups.google.com/forum/#%21forum/django-announce
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.djangoproject.com/weblog/2024/jul/09/security-releases
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.16666
EPSS Score 0.00045
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-07-09T23:19:42.901194+00:00 SUSE Severity Score Importer Import https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml 34.0.0rc4