Safety vulnerability ID: 25636
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Beaker before 1.6.4, when using PyCrypto to encrypt sessions, uses AES in ECB cipher mode, which might allow remote attackers to obtain portions of sensitive session data via unspecified vectors.
Latest version: 1.13.0
A Session and Caching library with WSGI Middleware
=========================
.. warning::
Session hashing for encrypted sessions using PyCrypto has changed. This
will result in sessions being invalidated upon upgrading if PyCrypto is
used.
* Fix bug with key_length not being coerced to a int for comparison. Patch by
Greg Lavallee.
* Fix bug with cookie invalidation not clearing the cookie data. Patch by
Vasiliy Lozovoy.
* Added ability to pass in cookie_path for the Session. Patch by Marcin
Kuzminski.
* Add NSS crypto support to Beaker. Patch by Miloslav Trmac of Redhat.
* Fix security bug with pycrypto not securing data such that an attacker could
possibly determine parts of the encrypted payload. Patch by Miloslav Trmac of
Redhat. See `CVE-2012-3458 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3458>`_.
* Add ability to specify schema for database-backed sessions. Patch by Vladimir
Tananko.
* Fix issue with long key names in memcached backend. Patch by Guillaume
Taglang.
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application