Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1221526 - (CVE-2015-3982) CVE-2015-3982 django: incorrect session flushing in the cached_db backend
CVE-2015-3982 django: incorrect session flushing in the cached_db backend
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20150520,repor...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2015-05-14 05:38 EDT by Martin Prpič
Modified: 2015-05-22 06:38 EDT (History)
1 user (show)

See Also:
Fixed In Version: Django 1.8.2
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-05-14 05:40:50 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
cached-db-master.patch (2.26 KB, text/plain)
2015-05-14 05:39 EDT, Martin Prpič
no flags Details
cached-db-1.8.patch (2.33 KB, text/plain)
2015-05-14 05:39 EDT, Martin Prpič
no flags Details

  None (edit)
Description Martin Prpič 2015-05-14 05:38:27 EDT
The following flaw was found in Django 1.8:

A change to session.flush() in the cached_db session backend in Django 1.8 mistakenly sets the session key to an empty string rather than None. An empty string is treated as a valid session key and the session cookie is set accordingly. Any users with an empty string in their session cookie will use the same session store. session.flush() is called by django.contrib.auth.logout() and, more seriously, by django.contrib.auth.login() when a user switches accounts. If a user is logged in and logs in again to a different account (without logging out) the session is flushed to avoid reuse. After the session is flushed (and its session key becomes '') the account details are set on the session and the session is saved. Any users with an empty string in their session cookie will now be logged into that account.

Acknowledgements:

Red Hat would like to thank the upstream Django project for reporting this issue.
Comment 1 Martin Prpič 2015-05-14 05:39:21 EDT
Created attachment 1025330 [details]
cached-db-master.patch
Comment 2 Martin Prpič 2015-05-14 05:39:43 EDT
Created attachment 1025331 [details]
cached-db-1.8.patch
Comment 3 Martin Prpič 2015-05-14 05:40:50 EDT
Statement:

Not vulnerable. The 1.8 version of Django is not shipped in any Red Hat product.
Comment 4 Martin Prpič 2015-05-22 06:37:30 EDT
External References:

https://www.djangoproject.com/weblog/2015/may/20/security-release/

Note You need to log in before you can comment on or make changes to this bug.