{"id":"CVE-2019-13177","details":"verification.py in django-rest-registration (aka Django REST Registration library) before 0.5.0 relies on a static string for signatures (i.e., the Django Signing API is misused), which allows remote attackers to spoof the verification process. This occurs because incorrect code refactoring led to calling a security-critical function with an incorrect argument.","aliases":["GHSA-p3w6-jcg4-52xh","PYSEC-2019-20"],"modified":"2026-03-13T22:15:45.178088Z","published":"2019-07-02T22:15:09.770Z","related":["GHSA-p3w6-jcg4-52xh"],"references":[{"type":"ADVISORY","url":"https://github.com/apragacz/django-rest-registration/releases/tag/0.5.0"},{"type":"FIX","url":"https://github.com/apragacz/django-rest-registration/security/advisories/GHSA-p3w6-jcg4-52xh"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apragacz/django-rest-registration","events":[{"introduced":"0"},{"fixed":"39a407b7a44130d07a5f278ad838d5b9cda9e3eb"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.5.0"}]}}],"versions":["0.1.2","0.2.0","0.3.0","0.3.1","0.3.12","0.3.13","0.3.14","0.3.3","0.3.4","0.3.5","0.3.6","0.3.7","0.3.8","0.3.9","0.4.0","0.4.1","0.4.2","0.4.3","0.4.4","0.4.5"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-13177.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}