CVE-2016-2513 — Sensitive Information Exposure in Django
Severity
3.1LOWNVD
OSV7.4
EPSS
1.3%
top 20.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 8
Latest updateMay 17
Description
The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests.
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:NExploitability: 1.6 | Impact: 1.4
Affected Packages2 packages
🔴Vulnerability Details
6📋Vendor Advisories
3💬Community
5Bugzilla▶
CVE-2016-2513 python-django15: python-django: User enumeration through timing difference on password hasher work factor upgrade [epel-6]↗2016-03-04
Bugzilla▶
CVE-2016-2513 python-django: User enumeration through timing difference on password hasher work factor upgrade [fedora-all]↗2016-03-04
Bugzilla▶
CVE-2016-2513 python-django: User enumeration through timing difference on password hasher work factor upgrade [epel-7]↗2016-03-04
Bugzilla▶
CVE-2016-2513 django14: python-django: User enumeration through timing difference on password hasher work factor upgrade [epel-6]↗2016-03-04
Bugzilla▶
CVE-2016-2513 python-django: User enumeration through timing difference on password hasher work factor upgrade↗2016-02-24