{"vulnerability": "CVE-2024-21543", "sightings": [{"uuid": "b1d6312c-c18b-4cc4-b48a-604bafbfc5b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21543", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113643759382930445", "content": "", "creation_timestamp": "2024-12-13T05:02:35.376732Z"}, {"uuid": "f174cd40-efe7-4caa-9e50-a30d8cd0bc14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21543", "type": "seen", "source": "https://t.me/cvedetector/12825", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-21543 - Djoser Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-21543 \nPublished : Dec. 13, 2024, 5:15 a.m. | 41\u00a0minutes ago \nDescription : Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when the authenticate() function fails. This is because the system falls back to querying the database directly, granting access to users with valid credentials, and eventually bypassing custom authentication checks such as two-factor authentication, LDAP validations, or requirements from configured AUTHENTICATION_BACKENDS. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T07:24:11.000000Z"}, {"uuid": "c2490a63-27f4-4abd-be39-a0fc087a52e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21543", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4822", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-21543\n\ud83d\udd25 CVSS Score: 5.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when the authenticate() function fails. This is because the system falls back to querying the database directly, granting access to users with valid credentials, and eventually bypassing custom authentication checks such as two-factor authentication, LDAP validations, or requirements from configured AUTHENTICATION_BACKENDS.\n\ud83d\udccf Published: 2024-12-13T05:00:16.747Z\n\ud83d\udccf Modified: 2025-02-20T22:02:38.155Z\n\ud83d\udd17 References:\n1. https://security.snyk.io/vuln/SNYK-PYTHON-DJOSER-8366540\n2. https://github.com/sunscrapers/djoser/releases/tag/2.3.0\n3. https://github.com/sunscrapers/djoser/issues/795\n4. https://github.com/sunscrapers/djoser/pull/819\n5. https://github.com/sunscrapers/djoser/commit/d33c3993c0c735f23cbedc60fa59fce69354f19d", "creation_timestamp": "2025-02-20T22:17:43.000000Z"}, {"uuid": "21199940-c55e-44ac-a7bd-1e7c23896730", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21543", "type": "seen", "source": "Telegram/ynTV8tOGr7piAsl9BTCseHZxVuzmsf9LHsFkrsQztRrZlhcj", "content": "", "creation_timestamp": "2025-02-20T23:38:15.000000Z"}]}