You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
djangorestframework-simplejwt version 5.3.1 and before is vulnerable to information disclosure. A user can access web application resources even after their account has been disabled due to missing user validation checks via the for_user method.
mend-bolt-for-githubbot
changed the title
djangorestframework_simplejwt-5.3.1-py3-none-any.whl: 1 vulnerabilities (highest severity is: 7.5)
djangorestframework_simplejwt-5.3.1-py3-none-any.whl: 1 vulnerabilities (highest severity is: 5.5)
Nov 2, 2024
Vulnerable Library - djangorestframework_simplejwt-5.3.1-py3-none-any.whl
A minimal JSON Web Token authentication plugin for Django REST Framework
Library home page: https://files.pythonhosted.org/packages/f2/ab/88f73cf08d2ad3fb9f71b956dceca5680a57f121e5ce9a604f365877d57e/djangorestframework_simplejwt-5.3.1-py3-none-any.whl
Path to dependency file: /server/requirements.txt
Path to vulnerable library: /server/requirements.txt
Found in HEAD commit: 8233eb35f209c5b712ecc7d96645a2de905e8282
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-22513
Vulnerable Library - djangorestframework_simplejwt-5.3.1-py3-none-any.whl
A minimal JSON Web Token authentication plugin for Django REST Framework
Library home page: https://files.pythonhosted.org/packages/f2/ab/88f73cf08d2ad3fb9f71b956dceca5680a57f121e5ce9a604f365877d57e/djangorestframework_simplejwt-5.3.1-py3-none-any.whl
Path to dependency file: /server/requirements.txt
Path to vulnerable library: /server/requirements.txt
Dependency Hierarchy:
Found in HEAD commit: 8233eb35f209c5b712ecc7d96645a2de905e8282
Found in base branch: main
Vulnerability Details
djangorestframework-simplejwt version 5.3.1 and before is vulnerable to information disclosure. A user can access web application resources even after their account has been disabled due to missing user validation checks via the for_user method.
Publish Date: 2024-03-16
URL: CVE-2024-22513
CVSS 3 Score Details (5.5)
Base Score Metrics:
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: