티스토리 수익 글 보기

티스토리 수익 글 보기

[2.2.x] Fixed CVE-2020-24584 — Fixed permission escalation in interm… · django/django@a3aebfd · GitHub
Skip to content
/ django Public

Commit a3aebfd

Browse files
committed
[2.2.x] Fixed CVE-2020-24584 — Fixed permission escalation in intermediate-level directories of the file system cache on Python 3.7+.
Backport of f56b57976133129b0b351a38bba4ac882badabf0 from master.
1 parent 375657a commit a3aebfd

File tree

3 files changed

+38
2
lines changed

3 files changed

+38
2
lines changed

django/core/cache/backends/filebased.py

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -114,10 +114,15 @@ def _cull(self):
114114

115115
def _createdir(self):
116116
if not os.path.exists(self._dir):
117+
# Set the umask because os.makedirs() doesn't apply the "mode" argument
118+
# to intermediate-level directories.
119+
old_umask = os.umask(0o077)
117120
try:
118121
os.makedirs(self._dir, 0o700)
119122
except FileExistsError:
120123
pass
124+
finally:
125+
os.umask(old_umask)
121126

122127
def _key_to_file(self, key, version=None):
123128
"""

docs/releases/2.2.16.txt

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ Django 2.2.16 release notes
44

55
*Expected September 1, 2020*
66

7-
Django 2.2.16 fixes a security issue and two data loss bugs in 2.2.15.
7+
Django 2.2.16 fixes two security issues and two data loss bugs in 2.2.15.
88

99
CVE-2020-24583: Incorrect permissions on intermediate-level directories on Python 3.7+
1010
======================================================================================
@@ -17,6 +17,13 @@ files and to intermediate-level collected static directories when using the
1717
You should review and manually fix permissions on existing intermediate-level
1818
directories.
1919

20+
CVE-2020-24584: Permission escalation in intermediate-level directories of the file system cache on Python 3.7+
21+
===============================================================================================================
22+
23+
On Python 3.7+, the intermediate-level directories of the file system cache had
24+
the system's standard umask rather than ``0o077`` (no group or others
25+
permissions).
26+
2027
Bugfixes
2128
========
2229

tests/cache/tests.py

Lines changed: 25 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,13 @@
66
import pickle
77
import re
88
import shutil
9+
import sys
910
import tempfile
1011
import threading
1112
import time
1213
import unittest
13-
from unittest import mock
14+
from pathlib import Path
15+
from unittest import mock, skipIf
1416

1517
from django.conf import settings
1618
from django.core import management, signals
@@ -1430,6 +1432,28 @@ def test_get_ignores_enoent(self):
14301432
# Returns the default instead of erroring.
14311433
self.assertEqual(cache.get('foo', 'baz'), 'baz')
14321434

1435+
@skipIf(
1436+
sys.platform == 'win32',
1437+
'Windows only partially supports umasks and chmod.',
1438+
)
1439+
def test_cache_dir_permissions(self):
1440+
os.rmdir(self.dirname)
1441+
dir_path = Path(self.dirname) / 'nested' / 'filebasedcache'
1442+
for cache_params in settings.CACHES.values():
1443+
cache_params['LOCATION'] = str(dir_path)
1444+
setting_changed.send(self.__class__, setting='CACHES', enter=False)
1445+
cache.set('foo', 'bar')
1446+
self.assertIs(dir_path.exists(), True)
1447+
tests = [
1448+
dir_path,
1449+
dir_path.parent,
1450+
dir_path.parent.parent,
1451+
]
1452+
for directory in tests:
1453+
with self.subTest(directory=directory):
1454+
dir_mode = directory.stat().st_mode & 0o777
1455+
self.assertEqual(dir_mode, 0o700)
1456+
14331457
def test_get_does_not_ignore_non_filenotfound_exceptions(self):
14341458
with mock.patch('builtins.open', side_effect=IOError):
14351459
with self.assertRaises(IOError):

0 commit comments

Comments
 (0)