Timing Attack Affecting django package, versions [,1.8.10)[1.9,1.9.3)


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.72% (82nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-DJANGO-40383
  • published1 Mar 2016
  • disclosed1 Mar 2016
  • creditSjoerd Job Postmus

Introduced: 1 Mar 2016

CVE-2016-2513  (opens in a new tab)
CWE-200  (opens in a new tab)

Overview

django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Affected versions of this package are vulnerable to Timing attacks. There is a timing difference between a login request for a user with a password encoded in an older number of iterations and login request for a nonexistent user (which runs the default hasher's default number of iterations). This only affects users who haven't logged in since the iterations were increased in Django 1.6.

CVSS Scores

version 3.1