[Openstack-security] Fwd: [Full-disclosure] [Django] Cookie-based session storage session invalidation issue

Jeffrey Walton noloader at gmail.com
Wed Oct 2 09:09:29 UTC 2013


Not sure if this made anyone's radar....

(I'm not sure about the 1.7 version, though).

---------- Forwarded message ----------
From: G. S. McNamara <main at gsmcnamara.com>
Date: Tue, Oct 1, 2013 at 4:20 PM
Subject: [Full-disclosure] [Django] Cookie-based session storage
session invalidation issue
To: full-disclosure at lists.grok.org.uk

FD,

I’m back!

Django versions 1.4 – 1.7 offer a cookie-based session storage option
(not the default this time) that is afflicted by the same issue I
posted about previously concerning Ruby on Rails:

If you obtain a user’s cookie, even if they log out, you can still log
in as them.

The short write-up is here, if needed:
http://maverickblogging.com/security-vulnerability-with-django-cookie-based-sessions/

Cheers,

G. S. McNamara

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/




More information about the Openstack-security mailing list