CVE-2019-13177
02.07.2019, 22:15
verification.py in django-rest-registration (aka Django REST Registration library) before 0.5.0 relies on a static string for signatures (i.e., the Django Signing API is misused), which allows remote attackers to spoof the verification process. This occurs because incorrect code refactoring led to calling a security-critical function with an incorrect argument.Enginsight
Vendor | Product | Version |
---|---|---|
django-rest-registration_project | django-rest-registration | 0.1.0 < 𝑥 < 0.5.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References