1
0
mirror of https://github.com/django/django.git synced 2025-10-31 09:41:08 +00:00

Fixed CVE-2016-9013 -- Generated a random database user password when running tests on Oracle.

This is a security fix.
This commit is contained in:
Marti Raudsepp
2016-10-24 15:22:00 -04:00
committed by Tim Graham
parent 9e9c81d3c2
commit da7910d483
5 changed files with 60 additions and 5 deletions

View File

@@ -6,6 +6,20 @@ Django 1.10.3 release notes
Django 1.10.3 fixes two security issues and several bugs in 1.10.2.
User with hardcoded password created when running tests on Oracle
=================================================================
When running tests with an Oracle database, Django creates a temporary database
user. In older versions, if a password isn't manually specified in the database
settings ``TEST`` dictionary, a hardcoded password is used. This could allow
an attacker with network access to the database server to connect.
This user is usually dropped after the test suite completes, but not when using
the ``manage.py test --keepdb`` option or if the user has an active session
(such as an attacker's connection).
A randomly generated password is now used for each test run.
Bugfixes
========