Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2013-1443
Deferred
More InfoOfficial Page
Source-security@debian.org
View Known Exploited Vulnerability (KEV) details
Published At-23 Sep, 2013 | 20:55
Updated At-11 Apr, 2025 | 00:51

The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

Django
djangoproject
>>django>>1.4
cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*
Django
djangoproject
>>django>>1.4.1
cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*
Django
djangoproject
>>django>>1.4.2
cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*
Django
djangoproject
>>django>>1.4.4
cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*
Django
djangoproject
>>django>>1.4.5
cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*
Django
djangoproject
>>django>>1.4.6
cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*
Django
djangoproject
>>django>>1.4.7
cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*
Django
djangoproject
>>django>>1.6
cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*
Django
djangoproject
>>django>>1.6
cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*
Django
djangoproject
>>django>>1.6
cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*
Django
djangoproject
>>django>>1.5
cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*
Django
djangoproject
>>django>>1.5
cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*
Django
djangoproject
>>django>>1.5
cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*
Django
djangoproject
>>django>>1.5.1
cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*
Django
djangoproject
>>django>>1.5.2
cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*
Django
djangoproject
>>django>>1.5.3
cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.htmlsecurity@debian.org
N/A
http://lists.opensuse.org/opensuse-updates/2013-11/msg00035.htmlsecurity@debian.org
N/A
http://python.6.x6.nabble.com/Set-a-reasonable-upper-bound-on-password-length-td5032218.htmlsecurity@debian.org
N/A
http://www.debian.org/security/2013/dsa-2758security@debian.org
N/A
https://www.djangoproject.com/weblog/2013/sep/15/security/security@debian.org
Patch
Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-updates/2013-11/msg00035.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://python.6.x6.nabble.com/Set-a-reasonable-upper-bound-on-password-length-td5032218.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2013/dsa-2758af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.djangoproject.com/weblog/2013/sep/15/security/af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
Change History
0Changes found

Details not found