Search for vulnerabilities
Vulnerability details: VCID-qjx3-vgza-aaak
Vulnerability ID VCID-qjx3-vgza-aaak
Aliases CVE-2018-6188
GHSA-rf4j-j272-fj86
PYSEC-2018-4
Summary django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-6188.html
rhas Important https://access.redhat.com/errata/RHSA-2018:2927
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6188.json
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.00200 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.00200 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.00200 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.00200 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.00200 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.00200 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.00200 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.00200 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.00200 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.00200 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.00200 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.01547 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.0157 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
epss 0.02932 https://api.first.org/data/v1/epss?cve=CVE-2018-6188
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1538793
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6188
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-rf4j-j272-fj86
cvssv3.1 3.7 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 7.5 https://github.com/django/django/commit/57b95fedad5e0b83fc9c81466b7d1751c6427aae
generic_textual HIGH https://github.com/django/django/commit/57b95fedad5e0b83fc9c81466b7d1751c6427aae
cvssv3.1 7.5 https://github.com/django/django/commit/c37bb28677295f6edda61d8ac461014ef0d3aeb2
generic_textual HIGH https://github.com/django/django/commit/c37bb28677295f6edda61d8ac461014ef0d3aeb2
cvssv3.1 7.5 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2018-4.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2018-4.yaml
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2018-6188
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2018-6188
archlinux Medium https://security.archlinux.org/AVG-624
generic_textual Medium https://ubuntu.com/security/notices/USN-3559-1
cvssv3.1 7.5 https://usn.ubuntu.com/3559-1
generic_textual HIGH https://usn.ubuntu.com/3559-1
cvssv3.1 7.5 https://web.archive.org/web/20200517143909/http://www.securitytracker.com/id/1040422
generic_textual HIGH https://web.archive.org/web/20200517143909/http://www.securitytracker.com/id/1040422
cvssv3.1 7.5 https://www.djangoproject.com/weblog/2018/feb/01/security-releases
generic_textual HIGH https://www.djangoproject.com/weblog/2018/feb/01/security-releases
generic_textual Medium https://www.djangoproject.com/weblog/2018/feb/01/security-releases/
cvssv3.1 7.5 http://www.securitytracker.com/id/1040422
generic_textual HIGH http://www.securitytracker.com/id/1040422
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-6188.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6188.json
https://api.first.org/data/v1/epss?cve=CVE-2018-6188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6188
https://github.com/django/django
https://github.com/django/django/commit/57b95fedad5e0b83fc9c81466b7d1751c6427aae
https://github.com/django/django/commit/c37bb28677295f6edda61d8ac461014ef0d3aeb2
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2018-4.yaml
https://ubuntu.com/security/notices/USN-3559-1
https://usn.ubuntu.com/3559-1
https://usn.ubuntu.com/3559-1/
https://web.archive.org/web/20200517143909/http://www.securitytracker.com/id/1040422
https://www.djangoproject.com/weblog/2018/feb/01/security-releases
https://www.djangoproject.com/weblog/2018/feb/01/security-releases/
http://www.securitytracker.com/id/1040422
1538793 https://bugzilla.redhat.com/show_bug.cgi?id=1538793
AVG-624 https://security.archlinux.org/AVG-624
cpe:2.3:a:djangoproject:django:1.11.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.11.8:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.11.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.11.9:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:2.0:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:2.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:2.0.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
CVE-2018-6188 https://nvd.nist.gov/vuln/detail/CVE-2018-6188
GHSA-rf4j-j272-fj86 https://github.com/advisories/GHSA-rf4j-j272-fj86
RHSA-2018:2927 https://access.redhat.com/errata/RHSA-2018:2927
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6188.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/django/django/commit/57b95fedad5e0b83fc9c81466b7d1751c6427aae
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/django/django/commit/c37bb28677295f6edda61d8ac461014ef0d3aeb2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2018-4.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2018-6188
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2018-6188
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://usn.ubuntu.com/3559-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://web.archive.org/web/20200517143909/http://www.securitytracker.com/id/1040422
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.djangoproject.com/weblog/2018/feb/01/security-releases
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at http://www.securitytracker.com/id/1040422
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.56960
EPSS Score 0.00193
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.