{"id":"CVE-2024-39329","details":"An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.contrib.auth.backends.ModelBackend.authenticate() method allows remote attackers to enumerate users via a timing attack involving login requests for users with an unusable password.","aliases":["BIT-django-2024-39329","GHSA-x7q2-wr7g-xqmf","PYSEC-2024-57"],"modified":"2026-04-16T04:32:14.120848486Z","published":"2024-07-10T05:15:12.097Z","related":["CGA-jmgq-8c5r-24g9","SUSE-SU-2024:2545-1","SUSE-SU-2024:2577-1","openSUSE-SU-2024:0251-1","openSUSE-SU-2024:14203-1","openSUSE-SU-2024:14208-1","openSUSE-SU-2026:10005-1"],"references":[{"type":"ADVISORY","url":"https://docs.djangoproject.com/en/dev/releases/security/"},{"type":"ADVISORY","url":"https://www.djangoproject.com/weblog/2024/jul/09/security-releases/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240808-0005/"},{"type":"REPORT","url":"https://groups.google.com/forum/#%21forum/django-announce"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/django/django","events":[{"introduced":"879e5d587b84e6fc961829611999431778eb9f6a"},{"fixed":"98cf264c9cb0561e4ec305a621e9d58116e44aef"},{"introduced":"52821001bb62b764d73e63812133f199b8fef9eb"},{"fixed":"deec9b933ee8496274e4c53217a38f31cb59a27f"}],"database_specific":{"versions":[{"introduced":"4.2"},{"fixed":"4.2.14"},{"introduced":"5.0"},{"fixed":"5.0.7"}]}}],"versions":["4.2","4.2.1","4.2.10","4.2.11","4.2.12","4.2.13","4.2.2","4.2.3","4.2.4","4.2.5","4.2.6","4.2.7","4.2.8","4.2.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-39329.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}