The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "1.8.9"
},
{
"introduced": "0"
},
{
"last_affected": "1.9"
},
{
"introduced": "0"
},
{
"last_affected": "1.9.1"
},
{
"introduced": "0"
},
{
"last_affected": "1.9.2"
}
]
}