Forgetaboutit, the exact same problem is there for every session backend. This 
btw means that having write access to django_session table means exploit of all 
Django instances using that DB, right?

"""
Isn't there also the possibility that the attacker can somehow get arbitrary 
data signed into the session cookie without knowing SECRET_KEY? This could be 
due to a bug in the session framework or the developer does something really 
stupid. If this would be the case, then the bug would result in remote code 
execution exploit instead of the user being able to manipulate his session. 
Which sounds kinda scary.

If this is not changed to use JSON, there must be a warning that if the 
attacker can somehow change the contents of the cookie while keeping it signed, 
this results in remote exploit. One such way is knowing the SECRET_KEY.

My feeling is that this should be changed.

 - Anssi
"""

-- 
You received this message because you are subscribed to the Google Groups 
"Django developers" group.
To post to this group, send email to django-developers@googlegroups.com.
To unsubscribe from this group, send email to 
django-developers+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/django-developers?hl=en.

Reply via email to