An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.contrib.auth.backends.ModelBackend.authenticate() method allows remote attackers to enumerate users via a timing attack involving login requests for users with an unusable password.
{
"priority_reason": "requires user accounts with unusable passwords",
"binaries": [
{
"binary_name": "python-django",
"binary_version": "1.8.7-1ubuntu5.15+esm9"
},
{
"binary_name": "python-django-common",
"binary_version": "1.8.7-1ubuntu5.15+esm9"
},
{
"binary_name": "python3-django",
"binary_version": "1.8.7-1ubuntu5.15+esm9"
}
]
}{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"priority_reason": "requires user accounts with unusable passwords",
"binaries": [
{
"binary_name": "python-django",
"binary_version": "1:1.11.11-1ubuntu1.21+esm5"
},
{
"binary_name": "python-django-common",
"binary_version": "1:1.11.11-1ubuntu1.21+esm5"
},
{
"binary_name": "python3-django",
"binary_version": "1:1.11.11-1ubuntu1.21+esm5"
}
]
}