
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2019-10682 affects django-nopassword versions before 5.0.0. The vulnerability involves the storage of cleartext secrets (login codes) in the database, which could potentially expose sensitive authentication data (AttackerKB, GitHub Commit).
The vulnerability exists in the LoginCode model of django-nopassword where login codes were stored in cleartext in the database before version 5.0.0. The CVSS v3 Base Score is 7.5 (High), with attack vector being Network, requiring no privileges or user interaction (AttackerKB).
The storage of cleartext secrets in the database could allow attackers with database access to obtain valid login codes, potentially leading to unauthorized access to user accounts. This represents a significant security risk as it violates the principle of not storing sensitive authentication data in cleartext (GitHub Code).
The issue was fixed in version 5.0.0 of django-nopassword by removing the storage of codes in the database and implementing a hash-based comparison system instead. Users should upgrade to version 5.0.0 or later to address this vulnerability (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."