An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.contrib.auth.backends.ModelBackend.authenticate() method allows remote attackers to enumerate users via a timing attack involving login requests for users with an unusable password.
{ "binaries": [ { "binary_name": "python-django", "binary_version": "1.8.7-1ubuntu5.15+esm8" }, { "binary_name": "python-django-common", "binary_version": "1.8.7-1ubuntu5.15+esm8" }, { "binary_name": "python3-django", "binary_version": "1.8.7-1ubuntu5.15+esm8" } ], "priority_reason": "requires user accounts with unusable passwords" }
{ "binaries": [ { "binary_name": "python-django", "binary_version": "1:1.11.11-1ubuntu1.21+esm5" }, { "binary_name": "python-django-common", "binary_version": "1:1.11.11-1ubuntu1.21+esm5" }, { "binary_name": "python3-django", "binary_version": "1:1.11.11-1ubuntu1.21+esm5" } ], "priority_reason": "requires user accounts with unusable passwords", "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }