Bug 1911637 (CVE-2020-35681)

Summary: CVE-2020-35681 django-channels: potential leakage of session identifiers using legacy AsgiHandler
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bkearney, jal233, kaycoth, mhroncok, michel, mrunge, rdopiera, sgallagh, slavek.kabrda, ytale
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: python-django-channels 3.0.3 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-01-09 18:27:40 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1911638    
Bug Blocks: 1911639    

Description Guilherme de Almeida Suckevicz 2020-12-30 13:37:42 UTC
The legacy channels.http.AsgiHandler class, used for handling HTTP type requests in an ASGI environment prior to Django 3.0, did not correctly separate request scopes in Channels 3.0. In many cases this would result in a crash but, with correct timing responses could be sent to the wrong client, resulting in potential leakage of session identifiers and other sensitive data.

Reference:
https://channels.readthedocs.io/en/latest/releases/3.0.3.html

Comment 1 Guilherme de Almeida Suckevicz 2020-12-30 13:38:08 UTC
Created python-django tracking bugs for this issue:

Affects: fedora-all [bug 1911638]

Comment 3 Tomas Hoger 2021-01-04 08:45:40 UTC
This is not a flaw in the core Django, but in the Channels package for Django.  This should not affect any "python-django" packages as shipped in Red Hat products or Fedora.

Comment 5 Product Security DevOps Team 2021-01-09 18:27:40 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-35681