Bug 1221568 (CVE-2024-22513)

Summary: VUL-0: CVE-2024-22513: python-djangorestframework-simplejwt: information disclosure via inactive user
Product: [openSUSE] openSUSE Distribution Reporter: SMASH SMASH <smash_bz>
Component: SecurityAssignee: Markéta Machová <mmachova>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: carlos.lopez
Version: Leap 15.6   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/393624/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-03-18 09:24:26 UTC
djangorestframework-simplejwt version 5.3.1 and before is vulnerable to information disclosure. A user can access web application resources even after their account has been disabled due to missing user validation checks via the for_user method.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-22513
https://www.zerodayinitiative.com/advisories/ZDI-24-101/
https://www.cve.org/CVERecord?id=CVE-2024-22513
https://github.com/dmdhrumilmistry/CVEs/tree/main/CVE-2024-22513
https://bugzilla.redhat.com/show_bug.cgi?id=2269822