Vulnerability Description
Python Social Auth is a social authentication/registration mechanism. Prior to version 5.4.1, due to default case-insensitive collation in MySQL or MariaDB databases, third-party authentication user IDs are not case-sensitive and could cause different IDs to match. This issue has been addressed by a fix released in version 5.4.1. An immediate workaround would be to change collation of the affected field.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/python-social-auth/social-app-django/commit/31c3e0c7edb187004
- https://github.com/python-social-auth/social-app-django/pull/566
- https://github.com/python-social-auth/social-app-django/security/advisories/GHSA
- https://github.com/python-social-auth/social-app-django/commit/31c3e0c7edb187004
- https://github.com/python-social-auth/social-app-django/pull/566
- https://github.com/python-social-auth/social-app-django/security/advisories/GHSA
FAQ
What is CVE-2024-32879?
CVE-2024-32879 is a vulnerability with a CVSS score of 4.9 (MEDIUM). Python Social Auth is a social authentication/registration mechanism. Prior to version 5.4.1, due to default case-insensitive collation in MySQL or MariaDB databases, third-party authentication user I...
How severe is CVE-2024-32879?
CVE-2024-32879 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-32879?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.