December 18, 2019
Django 3.0.1 fixes a security issue and several bugs in 3.0.
By submitting a suitably crafted email address making use of Unicode characters, that compared equal to an existing user email when lower-cased for comparison, an attacker could be sent a password reset token for the matched account.
In order to avoid this vulnerability, password reset requests now compare the submitted email using the stricter, recommended algorithm for case-insensitive comparison of two identifiers from Unicode Technical Report 36, section 2.11.2(B)(2). Upon a match, the email containing the reset token will be sent to the email address on record rather than the submitted address.
Fixed a regression in Django 3.0 by restoring the ability to use Django
inside Jupyter and other environments that force an async context, by adding
an option to disable Async safety mechanism with
DJANGO_ALLOW_ASYNC_UNSAFE environment variable (#31056).
Fixed a data loss possibility in
SplitArrayField. When using with
ArrayField(BooleanField()), all values after the first
were marked as checked instead of preserving passed values (#31073).