{"id":"CVE-2020-11037","details":"In Wagtail before versions 2.7.3 and 2.8.2, a potential timing attack exists on pages or documents that have been protected with a shared password through Wagtail's \"Privacy\" controls. This password check is performed through a character-by-character string comparison, and so an attacker who is able to measure the time taken by this check to a high degree of accuracy could potentially use timing differences to gain knowledge of the password. This is [understood to be feasible on a local network, but not on the public internet](https://groups.google.com/d/msg/django-developers/iAaq0pvHXuA/fpUuwjK3i2wJ).\n\nPrivacy settings that restrict access to pages/documents on a per-user or per-group basis (as opposed to a shared password) are unaffected by this vulnerability.\n\nThis has been patched in 2.7.3, 2.8.2, 2.9.","aliases":["GHSA-jjjr-3jcw-f8v6","PYSEC-2020-153"],"modified":"2026-05-18T18:26:24.062327Z","published":"2020-04-30T23:15:11.887Z","references":[{"type":"ADVISORY","url":"https://github.com/wagtail/wagtail/security/advisories/GHSA-jjjr-3jcw-f8v6"},{"type":"FIX","url":"https://github.com/wagtail/wagtail/commit/3c030490ed575bb9cd01dfb3a890477dcaeb2edf"},{"type":"FIX","url":"https://github.com/wagtail/wagtail/commit/b76ab57ee859732b9cf9287d380493ab24061090"},{"type":"FIX","url":"https://github.com/wagtail/wagtail/commit/ba9d424bd1ca5ce1910d3de74f5cc07214fbfb11"},{"type":"FIX","url":"https://github.com/wagtail/wagtail/commit/bac3cd0a26b023e595cf2959aae7da15bb5e4340"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wagtail/wagtail","events":[{"introduced":"72dcbb674cac38b488de984719cb20a08542eb5f"},{"fixed":"3f550391d1ccfa167c57734a1497ed5a7603d29e"},{"introduced":"081705fc7a2d9aec75da25a3593b490f3c145d2b"},{"fixed":"6d3cd18107b3c29c43543cad842c01035a377d37"},{"fixed":"3c030490ed575bb9cd01dfb3a890477dcaeb2edf"},{"fixed":"b76ab57ee859732b9cf9287d380493ab24061090"},{"fixed":"ba9d424bd1ca5ce1910d3de74f5cc07214fbfb11"},{"fixed":"bac3cd0a26b023e595cf2959aae7da15bb5e4340"}],"database_specific":{"cpe":["cpe:2.3:a:torchbox:wagtail:*:*:*:*:lts:*:*:*","cpe:2.3:a:torchbox:wagtail:*:*:*:*:*:*:*:*"],"extracted_events":[{"introduced":"2.7"},{"fixed":"2.7.3"},{"introduced":"2.8"},{"fixed":"2.8.2"}],"source":["CPE_FIELD","REFERENCES"]}}],"versions":["v2.8.1","v2.7.2","v2.8","v2.7.1","v2.7"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-11037.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}