PyPi: Beaker

CVE-2012-3458

Safety vulnerability ID: 25636

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Sep 15, 2012 Updated at Apr 11, 2024
Scan your Python projects for vulnerabilities →

Advisory

Beaker before 1.6.4, when using PyCrypto to encrypt sessions, uses AES in ECB cipher mode, which might allow remote attackers to obtain portions of sensitive session data via unspecified vectors.

Affected package

beaker

Latest version: 1.13.0

A Session and Caching library with WSGI Middleware

Affected versions

Fixed versions

Vulnerability changelog

=========================

.. warning::

Session hashing for encrypted sessions using PyCrypto has changed. This
will result in sessions being invalidated upon upgrading if PyCrypto is
used.

* Fix bug with key_length not being coerced to a int for comparison. Patch by
Greg Lavallee.
* Fix bug with cookie invalidation not clearing the cookie data. Patch by
Vasiliy Lozovoy.
* Added ability to pass in cookie_path for the Session. Patch by Marcin
Kuzminski.
* Add NSS crypto support to Beaker. Patch by Miloslav Trmac of Redhat.
* Fix security bug with pycrypto not securing data such that an attacker could
possibly determine parts of the encrypted payload. Patch by Miloslav Trmac of
Redhat. See `CVE-2012-3458 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3458>`_.
* Add ability to specify schema for database-backed sessions. Patch by Vladimir
Tananko.
* Fix issue with long key names in memcached backend. Patch by Guillaume
Taglang.

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 4.3

CVSS v2 Details

MEDIUM 4.3
Access Vector (AV)
NETWORK
Access Complexity (AC)
MEDIUM
Authentication (Au)
NONE
Confidentiality Impact (C)
PARTIAL
Integrity Impact (I)
NONE
Availability Impact (A)
NONE