CVE-2024-21543

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-21543
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-21543.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-21543
Aliases
Related
Published
2024-12-13T05:15:07Z
Modified
2025-01-14T05:56:45.771986Z
Summary
[none]
Details

Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when the authenticate() function fails. This is because the system falls back to querying the database directly, granting access to users with valid credentials, and eventually bypassing custom authentication checks such as two-factor authentication, LDAP validations, or requirements from configured AUTHENTICATION_BACKENDS.

References

Affected packages

Debian:11 / djoser

Package

Name
djoser
Purl
pkg:deb/debian/djoser?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.1.0-1
2.3.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / djoser

Package

Name
djoser
Purl
pkg:deb/debian/djoser?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.1.0-1
2.3.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / djoser

Package

Name
djoser
Purl
pkg:deb/debian/djoser?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.1-1

Affected versions

2.*

2.1.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/sunscrapers/djoser

Affected ranges

Type
GIT
Repo
https://github.com/sunscrapers/djoser
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.2.1
0.3.0
0.3.1
0.4.0
0.4.1
0.4.3
0.5.0
0.5.1
0.5.2
0.5.3
0.5.4
0.6.0
0.7.0

1.*

1.0.0
1.0.1
1.1.0
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5
1.2.0
1.2.1
1.3.0
1.3.1
1.3.2
1.4.0
1.5.0
1.5.1
1.6.0
1.7.0

2.*

2.0.0
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5
2.1.0
2.2.1
2.2.2