CVE-2024-21543
Publication date 13 December 2024
Last updated 18 March 2025
Ubuntu priority
Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when the authenticate() function fails. This is because the system falls back to querying the database directly, granting access to users with valid credentials, and eventually bypassing custom authentication checks such as two-factor authentication, LDAP validations, or requirements from configured AUTHENTICATION_BACKENDS.
Status
Package | Ubuntu Release | Status |
---|---|---|
djoser | 24.10 oracular |
Fixed 2.1.0-1ubuntu0.24.10.1
|
24.04 LTS noble |
Fixed 2.1.0-1ubuntu0.24.04.1
|
|
22.04 LTS jammy |
Fixed 2.1.0-1ubuntu0.22.04.1
|
|
20.04 LTS focal |
Fixed 2.0.3-1ubuntu0.1~esm1
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
References
Related Ubuntu Security Notices (USN)
- USN-7354-1
- djoser vulnerability
- 17 March 2025
Other references
- https://www.cve.org/CVERecord?id=CVE-2024-21543
- https://github.com/sunscrapers/djoser/commit/d33c3993c0c735f23cbedc60fa59fce69354f19d
- https://github.com/sunscrapers/djoser/issues/795
- https://github.com/sunscrapers/djoser/pull/819
- https://github.com/sunscrapers/djoser/releases/tag/2.3.0
- https://security.snyk.io/vuln/SNYK-PYTHON-DJOSER-8366540