The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests.
{
"cpe": [
"cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "1.8.9"
},
{
"last_affected": "1.9"
},
{
"last_affected": "1.9.1"
},
{
"last_affected": "1.9.2"
}
],
"source": "CPE_FIELD"
}