PYSEC-2019-20

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/django-rest-registration/PYSEC-2019-20.yaml
JSON Data
https://api.test.osv.dev/v1/vulns/PYSEC-2019-20
Aliases
Published
2019-07-02T22:15:00Z
Modified
2023-11-01T04:50:24.056614Z
Summary
[none]
Details

verification.py in django-rest-registration (aka Django REST Registration library) before 0.5.0 relies on a static string for signatures (i.e., the Django Signing API is misused), which allows remote attackers to spoof the verification process. This occurs because incorrect code refactoring led to calling a security-critical function with an incorrect argument.

References

Affected packages

PyPI / django-rest-registration

Package

Name
django-rest-registration
View open source insights on deps.dev
Purl
pkg:pypi/django-rest-registration

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.0

Affected versions

0.*

0.1.2
0.2.0
0.2.1
0.2.4
0.3.0
0.3.3
0.3.4
0.3.5
0.3.6
0.3.7
0.3.8
0.3.9
0.3.12
0.3.13
0.3.14
0.4.0
0.4.1
0.4.2
0.4.3
0.4.4
0.4.5