An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.contrib.auth.backends.ModelBackend.authenticate() method allows remote attackers to enumerate users via a timing attack involving login requests for users with an unusable password.
References
| Link | Resource |
|---|---|
| https://docs.djangoproject.com/en/dev/releases/security/ | Vendor Advisory |
| https://groups.google.com/forum/#%21forum/django-announce | Permissions Required |
| https://www.djangoproject.com/weblog/2024/jul/09/security-releases/ | Vendor Advisory |
| https://docs.djangoproject.com/en/dev/releases/security/ | Vendor Advisory |
| https://groups.google.com/forum/#%21forum/django-announce | Permissions Required |
| https://security.netapp.com/advisory/ntap-20240808-0005/ | |
| https://www.djangoproject.com/weblog/2024/jul/09/security-releases/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
04 Nov 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2024-07-10 05:15
Updated : 2025-11-04 17:15
NVD link : CVE-2024-39329
Mitre link : CVE-2024-39329
CVE.ORG link : CVE-2024-39329
JSON object : View
Products Affected
djangoproject
- django
CWE
CWE-208
Observable Timing Discrepancy
