Closed Bug 1434468 Opened 7 years ago Closed 4 years ago

Django security release 2018-02-01 (AirMoz)

Categories

(Webtools Graveyard :: Air Mozilla, defect)

defect
Not set
normal

Tracking

(Not tracked)

RESOLVED INVALID

People

(Reporter: weir, Unassigned)

Details

Attachments

(3 files)

CVE-2018-6188: Information leakage in AuthenticationForm ======================================================== A regression in Django 1.11.8 made django.contrib.auth.forms.AuthenticationForm run its confirm_login_allowed() method even if an incorrect password is entered. This can leak information about a user, depending on what messages confirm_login_allowed() raises. If confirm_login_allowed() isn't overridden, an attacker enter an arbitrary username and see if that user has been set to is_active=False. If confirm_login_allowed() is overridden, more sensitive details could be leaked. This issue is fixed with the caveat that AuthenticationForm can no longer raise the "This account is inactive." error if the authentication backend rejects inactive users (the default authentication backend, ModelBackend, has done that since Django 1.10). This issue will be revisited for Django 2.1 as a fix to address the caveat will likely be too invasive for inclusion in older versions. Affected versions ================= * Django master development branch * Django 2.0 and 2.0.1 * Django 1.11.8 and 1.11.9 Resolution ========== Included with this bug are patches implementing the change described above for each affected version of Django. On the release date, these patches will be applied to the Django development repository and the following releases will be issued along with disclosure of the issues: * Django 2.0.2 * Django 1.11.10 [1] https://www.djangoproject.com/security/

Platform deprecated.

Status: NEW → RESOLVED
Closed: 4 years ago
Resolution: --- → INVALID
Product: Webtools → Webtools Graveyard
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: