Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 478334

Summary: dev-python/django-1.4.8 : "authenticate()" User Enumeration Weakness
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: python
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://secunia.com/advisories/54197/
Whiteboard: B4 [noglsa]
Package list:
Runtime testing required: ---
Bug Depends on: 484984    
Bug Blocks:    

Description Agostino Sarubbo gentoo-dev 2013-07-27 09:29:33 UTC
From ${URL} :

Description

A weakness has been reported in Django, which can be exploited by malicious people to disclose 
certain sensitive information.

The weakness is caused due to the "authenticate()" function returning responses at different times 
depending on validity of the provided user name. This can be exploited to enumerate valid user 
names.

The weakness is reported in version 1.5. Other versions may also be affected.


Solution:
Fixed in the GIT repository.

Further details available to Secunia VIM customers

Provided and/or discovered by:
Justin Paglierani in a bug report.

Original Advisory:
https://code.djangoproject.com/ticket/20760
http://www.openwall.com/lists/oss-security/2013/07/22/4


@maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
Comment 1 Chris Reffett (RETIRED) gentoo-dev Security 2013-07-27 15:17:34 UTC
Waiting on decision of whether this requires a CVE. Patch available from upstream at [1].

[1] https://code.djangoproject.com/attachment/ticket/20760/20760_fix_hash_once.diff
Comment 2 Chris Reffett (RETIRED) gentoo-dev Security 2013-08-27 01:17:15 UTC
Patch merged upstream, available at [1].

[1] https://github.com/django/django/commit/5b47a9c5a0dcb513dc5ff68b617b3aa374c90f3b