summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMarti Raudsepp <marti@juffo.org>2016-10-24 15:22:00 -0400
committerTim Graham <timograham@gmail.com>2016-10-25 14:24:11 -0400
commit70f99952965a430daf69eeb9947079aae535d2d0 (patch)
treea934012c9488d7009deac7cfd9427eab4c215b4f
parent33bf6220e249b98f05c04f08baaa50f56233104e (diff)
[1.8.x] Fixed CVE-2016-9013 -- Generated a random database user password when running tests on Oracle.
This is a security fix.
-rw-r--r--django/db/backends/oracle/creation.py16
-rw-r--r--docs/ref/settings.txt6
-rw-r--r--docs/releases/1.8.16.txt14
3 files changed, 31 insertions, 5 deletions
diff --git a/django/db/backends/oracle/creation.py b/django/db/backends/oracle/creation.py
index b7373e8a04..28475a6e55 100644
--- a/django/db/backends/oracle/creation.py
+++ b/django/db/backends/oracle/creation.py
@@ -4,10 +4,10 @@ import time
from django.conf import settings
from django.db.backends.base.creation import BaseDatabaseCreation
from django.db.utils import DatabaseError
+from django.utils.crypto import get_random_string
from django.utils.six.moves import input
TEST_DATABASE_PREFIX = 'test_'
-PASSWORD = 'Im_a_lumberjack'
class DatabaseCreation(BaseDatabaseCreation):
@@ -188,7 +188,11 @@ class DatabaseCreation(BaseDatabaseCreation):
]
# Ignore "user already exists" error when keepdb is on
acceptable_ora_err = 'ORA-01920' if keepdb else None
- self._execute_allow_fail_statements(cursor, statements, parameters, verbosity, acceptable_ora_err)
+ success = self._execute_allow_fail_statements(cursor, statements, parameters, verbosity, acceptable_ora_err)
+ # If the password was randomly generated, change the user accordingly.
+ if not success and self._test_settings_get('PASSWORD') is None:
+ set_password = "ALTER USER %(user)s IDENTIFIED BY %(password)s"
+ self._execute_statements(cursor, [set_password], parameters, verbosity)
# Most test-suites can be run without the create-view privilege. But some need it.
extra = "GRANT CREATE VIEW TO %(user)s"
success = self._execute_allow_fail_statements(cursor, [extra], parameters, verbosity, 'ORA-01031')
@@ -263,7 +267,7 @@ class DatabaseCreation(BaseDatabaseCreation):
"""
settings_dict = self.connection.settings_dict
val = settings_dict['TEST'].get(key, default)
- if val is None:
+ if val is None and prefixed:
val = TEST_DATABASE_PREFIX + settings_dict[prefixed]
return val
@@ -280,7 +284,11 @@ class DatabaseCreation(BaseDatabaseCreation):
return self._test_settings_get('USER', prefixed='USER')
def _test_database_passwd(self):
- return self._test_settings_get('PASSWORD', default=PASSWORD)
+ password = self._test_settings_get('PASSWORD')
+ if password is None and self._test_user_create():
+ # Oracle passwords are limited to 30 chars and can't contain symbols.
+ password = get_random_string(length=30)
+ return password
def _test_database_tblspace(self):
return self._test_settings_get('TBLSPACE', prefixed='USER')
diff --git a/docs/ref/settings.txt b/docs/ref/settings.txt
index 30a2c7d1fe..382ce2edfc 100644
--- a/docs/ref/settings.txt
+++ b/docs/ref/settings.txt
@@ -773,7 +773,11 @@ Default: ``None``
This is an Oracle-specific setting.
The password to use when connecting to the Oracle database that will be used
-when running tests. If not provided, Django will use a hardcoded default value.
+when running tests. If not provided, Django will generate a random password.
+
+.. versionchanged:: 1.8.16
+
+ Older versions used a hardcoded default password.
.. setting:: TEST_TBLSPACE
diff --git a/docs/releases/1.8.16.txt b/docs/releases/1.8.16.txt
index b650340330..aa5d9cccea 100644
--- a/docs/releases/1.8.16.txt
+++ b/docs/releases/1.8.16.txt
@@ -5,3 +5,17 @@ Django 1.8.16 release notes
*November 1, 2016*
Django 1.8.16 fixes two security issues in 1.8.15.
+
+User with hardcoded password created when running tests on Oracle
+=================================================================
+
+When running tests with an Oracle database, Django creates a temporary database
+user. In older versions, if a password isn't manually specified in the database
+settings ``TEST`` dictionary, a hardcoded password is used. This could allow
+an attacker with network access to the database server to connect.
+
+This user is usually dropped after the test suite completes, but not when using
+the ``manage.py test --keepdb`` option or if the user has an active session
+(such as an attacker's connection).
+
+A randomly generated password is now used for each test run.