homepage

This issue tracker has been migrated to GitHub , and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

classification
Title: Support for httponly/secure cookies reintroduced lax parsing behavior
Type: security Stage: resolved
Components: Library (Lib) Versions: Python 3.5
process
Status: closed Resolution: fixed
Dependencies: Superseder:
Assigned To: Nosy List: Arfrever, PaulMcMillan, Tim.Graham, berker.peksag, georg.brandl, pitrou, python-dev, r.david.murray, rhettinger
Priority: normal Keywords: patch

Created on 2014年11月04日 16:47 by Tim.Graham, last changed 2022年04月11日 14:58 by admin. This issue is now closed.

Files
File name Uploaded Description Edit
cookie_strict_parsing.patch pitrou, 2014年11月04日 20:31 review
Messages (16)
msg230637 - (view) Author: Tim Graham (Tim.Graham) * Date: 2014年11月04日 16:47
As noted in the comments of #22758 by Georg Brandle: 
* Django uses __init__(str()) roundtripping, which is not explicitly supported by the library, and worked by accident with previous versions. That it works again with 3.3+ is another accident, and a bug.
(The change for #16611 reintroduces "lax" parsing behavior that the security fix [1] was supposed to prevent.)
[1] https://hg.python.org/cpython/rev/d3663a0f97ed 
msg230644 - (view) Author: R. David Murray (r.david.murray) * (Python committer) Date: 2014年11月04日 17:23
This test still exists, so the change didn't cause it to trigger. What is the security bug? The commit doesn't say, and doesn't reference an issue number. So if that test still passes, what's the bug?
msg230645 - (view) Author: Georg Brandl (georg.brandl) * (Python committer) Date: 2014年11月04日 17:38
Well, with this change you can again (e.g.) pass
"Set-cookie: foo=bar"
which isn't a valid cookie. It doesn't reintroduce the same vulnerability, but it will still silently consume invalid cookies (i.e. such with attribute-like tokens upfront) and return a seemingly valid one.
IMO this is questionable behavior of the kind that can enable exploits, which is also why it was disallowed by the fix of the first vulnerability.
msg230650 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2014年11月04日 18:34
The security issue isn't easy to explain, it involves an elaborated set of services (browser, Web site...) each having a slightly different notion of cookie parsing to mount an attack allowing to bypass CSRF protection on certain Python-powered frameworks. It's from a report made to security@p.o. 
msg230651 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2014年11月04日 19:10
This qualification isn't really accurate:
> The change for #16611 reintroduces "lax" parsing behavior that the security fix [1] was supposed to prevent
since the #16611 changes were committed *before* the security fix.
msg230653 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2014年11月04日 19:49
Note that f81846c2b746 adds an explicit test for acceptance of invalid cookie strings ("test_bad_attrs").
msg230654 - (view) Author: Georg Brandl (georg.brandl) * (Python committer) Date: 2014年11月04日 19:51
These are unknown attributes after a key=value pair. What this issue is about is accepting attributes *before* any key=value pair.
msg230655 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2014年11月04日 20:31
Well, if we want to become stricter, I don't it makes sense to stop at the middle of the road.
In any case, here is a patch enabling strict parsing.
msg230658 - (view) Author: Tim Graham (Tim.Graham) * Date: 2014年11月05日 02:41
Django's test suite passes with the proposed patch after some updates: https://github.com/django/django/pull/3455 
msg230668 - (view) Author: Raymond Hettinger (rhettinger) * (Python committer) Date: 2014年11月05日 08:41
The patch looks good. One nit, please change "items" to "typed_items" or somesuch. That will make it clear why there are 3-tuples instead of the traditional 2-tuple used for normal mappings.
msg230719 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2014年11月05日 23:59
Paul, Tim, do you think there's a real risk of regression with the proposed patch?
msg230721 - (view) Author: Tim Graham (Tim.Graham) * Date: 2014年11月06日 01:10
Security-wise? I don't know, I haven't really been in the loop on the original issue.
msg230728 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2014年11月06日 07:31
No, I meant functionality-wise.
msg230758 - (view) Author: Tim Graham (Tim.Graham) * Date: 2014年11月06日 19:41
Django's test suite doesn't reveal any regressions. All the changes there are expected as far as I can see.
msg231451 - (view) Author: Roundup Robot (python-dev) (Python triager) Date: 2014年11月21日 00:23
New changeset a065ab1c67a8 by Antoine Pitrou in branch 'default':
Issue #22796: HTTP cookie parsing is now stricter, in order to protect against potential injection attacks.
https://hg.python.org/cpython/rev/a065ab1c67a8 
msg231452 - (view) Author: Antoine Pitrou (pitrou) * (Python committer) Date: 2014年11月21日 00:24
Thank you, I've committed the patch to 3.5 now.
History
Date User Action Args
2022年04月11日 14:58:09adminsetgithub: 66985
2014年11月21日 00:24:26pitrousetstatus: open -> closed
resolution: fixed
messages: + msg231452

stage: commit review -> resolved
2014年11月21日 00:23:57python-devsetnosy: + python-dev
messages: + msg231451
2014年11月06日 19:41:22Tim.Grahamsetmessages: + msg230758
2014年11月06日 07:31:04pitrousetmessages: + msg230728
2014年11月06日 01:10:49Tim.Grahamsetmessages: + msg230721
2014年11月05日 23:59:01pitrousetstage: commit review
messages: + msg230719
versions: + Python 3.5, - Python 2.7, Python 3.2, Python 3.3, Python 3.4
2014年11月05日 08:41:40rhettingersetnosy: + rhettinger
messages: + msg230668
2014年11月05日 02:41:55Tim.Grahamsetmessages: + msg230658
2014年11月04日 20:33:01pitrousetnosy: + PaulMcMillan
2014年11月04日 20:31:47pitrousetfiles: + cookie_strict_parsing.patch
keywords: + patch
messages: + msg230655
2014年11月04日 19:51:30georg.brandlsetmessages: + msg230654
2014年11月04日 19:49:26pitrousetmessages: + msg230653
2014年11月04日 19:10:29pitrousetmessages: + msg230651
2014年11月04日 18:34:36pitrousetmessages: + msg230650
2014年11月04日 17:38:58georg.brandlsetmessages: + msg230645
2014年11月04日 17:23:21r.david.murraysetmessages: + msg230644
2014年11月04日 16:58:55Arfreversetnosy: + Arfrever
2014年11月04日 16:47:43Tim.Grahamcreate

AltStyle によって変換されたページ (->オリジナル) /