Discussion:
[oss-security] Django security release issued: 2.1.2
Carlton Gibson
2018-10-01 09:33:47 UTC
Permalink
Today the Django team issued 2.1.2 as part of our security
process. This release address a security issue, and we encourage all
users to upgrade as soon as possible:

https://www.djangoproject.com/weblog/2018/oct/01/security-release/ <https://www.djangoproject.com/weblog/2018/oct/01/security-release/>

As a reminder, we ask that potential security issues be reported via
private email to ***@djangoproject.com <mailto:***@djangoproject.com> and not via Django's Trac
instance or the django-developers list. Please see
https://www.djangoproject.com/security <https://www.djangoproject.com/security> for further information.
Solar Designer
2018-10-01 12:45:47 UTC
Permalink
Post by Carlton Gibson
Today the Django team issued 2.1.2 as part of our security
process. This release address a security issue, and we encourage all
https://www.djangoproject.com/weblog/2018/oct/01/security-release/
First of all, thank you for sharing this with oss-security.

Per oss-security list content guidelines, actual vulnerability detail
must be included in postings (message body or text/plain attachment).
The Subject could have easily been more descriptive for this list, too -
e.g., "CVE-2018-16984: Django: Password hash disclosure to "view only"
admin users".

Carlton, I'd appreciate it if you include such detail in your
oss-security postings (if any) on future occasions. Including the links
as well is great (such as for easy access to updated revisions while
the links work); including only links is discouraged.

Here's the vulnerability detail from the above URL:

---
CVE-2018-16984: Password hash disclosure to "view only" admin users

If an admin user has the change permission to the user model, only part
of the password hash is displayed in the change form. Admin users with
the view (but not change) permission to the user model were displayed
the entire hash. While it's typically infeasible to reverse a strong
password hash, if your site uses weaker password hashing algorithms such
as MD5 or SHA1, it could be a problem.

Thanks Phithon Gong for reporting this issue.
---

BTW, the feasibility of "reversing" a password hash depends not only on
hash type, but also on how many guesses the attacker would need to make
before likely hitting the right password. Without target user specific
information, that number depends on how common or not the password is.

Maybe the word "typically" allows for this exception for weak passwords.
However, unnecessarily revealing the password hash is a problem on its
own, not just "could be a problem" depending on hash type, although the
restriction to "admin users" and password hashing do mitigate the issue
to some extent.

Thanks,

Alexander
Alex Gaynor
2018-10-01 12:50:10 UTC
Permalink
FWIW, Django's default new-project template includes a password validator
that denies the ability to use 20,000 common passwords:
https://github.com/django/django/blob/master/django/conf/project_template/project_name/settings.py-tpl#L87-L100

-- This will not be true for older projects with settings.py that upgraded
Django versions, but did explicitly set PASSWORD_VALIDATORS, so that's a
thing people should do :-)

Alex
Post by Solar Designer
Post by Carlton Gibson
Today the Django team issued 2.1.2 as part of our security
process. This release address a security issue, and we encourage all
https://www.djangoproject.com/weblog/2018/oct/01/security-release/
First of all, thank you for sharing this with oss-security.
Per oss-security list content guidelines, actual vulnerability detail
must be included in postings (message body or text/plain attachment).
The Subject could have easily been more descriptive for this list, too -
e.g., "CVE-2018-16984: Django: Password hash disclosure to "view only"
admin users".
Carlton, I'd appreciate it if you include such detail in your
oss-security postings (if any) on future occasions. Including the links
as well is great (such as for easy access to updated revisions while
the links work); including only links is discouraged.
---
CVE-2018-16984: Password hash disclosure to "view only" admin users
If an admin user has the change permission to the user model, only part
of the password hash is displayed in the change form. Admin users with
the view (but not change) permission to the user model were displayed
the entire hash. While it's typically infeasible to reverse a strong
password hash, if your site uses weaker password hashing algorithms such
as MD5 or SHA1, it could be a problem.
Thanks Phithon Gong for reporting this issue.
---
BTW, the feasibility of "reversing" a password hash depends not only on
hash type, but also on how many guesses the attacker would need to make
before likely hitting the right password. Without target user specific
information, that number depends on how common or not the password is.
Maybe the word "typically" allows for this exception for weak passwords.
However, unnecessarily revealing the password hash is a problem on its
own, not just "could be a problem" depending on hash type, although the
restriction to "admin users" and password hashing do mitigate the issue
to some extent.
Thanks,
Alexander
--
All that is necessary for evil to succeed is for good people to do nothing.
Loading...