An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.contrib.auth.backends.ModelBackend.authenticate() method allows remote attackers to enumerate users via a timing attack involving login requests for users with an unusable password.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "python-django-common": "1:1.11.11-1ubuntu1.21+esm5", "python-django-doc": "1:1.11.11-1ubuntu1.21+esm5", "python-django": "1:1.11.11-1ubuntu1.21+esm5", "python3-django": "1:1.11.11-1ubuntu1.21+esm5" } ], "priority_reason": "requires user accounts with unusable passwords" }