[1.7.x] Fixed #23939 -- Moved session verification out of SessionAuthenticationMiddleware.

Thanks andrewbadr for the report and Carl Meyer for the review.

Backport of b06dfad88f from master
This commit is contained in:
Tim Graham 2014-12-03 07:33:44 -05:00
parent e9975ed3cd
commit 99c0cc5300
5 changed files with 59 additions and 34 deletions

View File

@ -4,9 +4,10 @@ import re
from django.apps import apps as django_apps from django.apps import apps as django_apps
from django.conf import settings from django.conf import settings
from django.core.exceptions import ImproperlyConfigured, PermissionDenied from django.core.exceptions import ImproperlyConfigured, PermissionDenied
from django.middleware.csrf import rotate_token
from django.utils.crypto import constant_time_compare
from django.utils.module_loading import import_string from django.utils.module_loading import import_string
from django.utils.translation import LANGUAGE_SESSION_KEY from django.utils.translation import LANGUAGE_SESSION_KEY
from django.middleware.csrf import rotate_token
from .signals import user_logged_in, user_logged_out, user_login_failed from .signals import user_logged_in, user_logged_out, user_login_failed
@ -156,6 +157,18 @@ def get_user(request):
if backend_path in settings.AUTHENTICATION_BACKENDS: if backend_path in settings.AUTHENTICATION_BACKENDS:
backend = load_backend(backend_path) backend = load_backend(backend_path)
user = backend.get_user(user_id) user = backend.get_user(user_id)
# Verify the session
if ('django.contrib.auth.middleware.SessionAuthenticationMiddleware'
in settings.MIDDLEWARE_CLASSES and hasattr(user, 'get_session_auth_hash')):
session_hash = request.session.get(HASH_SESSION_KEY)
session_hash_verified = session_hash and constant_time_compare(
session_hash,
user.get_session_auth_hash()
)
if not session_hash_verified:
request.session.flush()
user = None
return user or AnonymousUser() return user or AnonymousUser()

View File

@ -2,7 +2,6 @@ from django.contrib import auth
from django.contrib.auth import load_backend from django.contrib.auth import load_backend
from django.contrib.auth.backends import RemoteUserBackend from django.contrib.auth.backends import RemoteUserBackend
from django.core.exceptions import ImproperlyConfigured from django.core.exceptions import ImproperlyConfigured
from django.utils.crypto import constant_time_compare
from django.utils.functional import SimpleLazyObject from django.utils.functional import SimpleLazyObject
@ -25,20 +24,15 @@ class AuthenticationMiddleware(object):
class SessionAuthenticationMiddleware(object): class SessionAuthenticationMiddleware(object):
""" """
Middleware for invalidating a user's sessions that don't correspond to the Formerly, a middleware for invalidating a user's sessions that don't
user's current session authentication hash (generated based on the user's correspond to the user's current session authentication hash. However, it
password for AbstractUser). caused the "Vary: Cookie" header on all responses.
Now a backwards compatibility shim that enables session verification in
auth.get_user() if this middleware is in MIDDLEWARE_CLASSES.
""" """
def process_request(self, request): def process_request(self, request):
user = request.user pass
if user and hasattr(user, 'get_session_auth_hash'):
session_hash = request.session.get(auth.HASH_SESSION_KEY)
session_hash_verified = session_hash and constant_time_compare(
session_hash,
user.get_session_auth_hash()
)
if not session_hash_verified:
auth.logout(request)
class RemoteUserMiddleware(object): class RemoteUserMiddleware(object):

View File

@ -1,4 +1,4 @@
from django.contrib.auth.middleware import SessionAuthenticationMiddleware from django.contrib.auth.middleware import AuthenticationMiddleware
from django.contrib.auth.models import User from django.contrib.auth.models import User
from django.http import HttpRequest from django.http import HttpRequest
from django.test import TestCase from django.test import TestCase
@ -11,25 +11,39 @@ class TestSessionAuthenticationMiddleware(TestCase):
'test@example.com', 'test@example.com',
self.user_password) self.user_password)
def test_changed_password_invalidates_session(self): self.middleware = AuthenticationMiddleware()
"""
Tests that changing a user's password invalidates the session.
"""
verification_middleware = SessionAuthenticationMiddleware()
self.assertTrue(self.client.login( self.assertTrue(self.client.login(
username=self.user.username, username=self.user.username,
password=self.user_password, password=self.user_password,
)) ))
request = HttpRequest() self.request = HttpRequest()
request.session = self.client.session self.request.session = self.client.session
request.user = self.user
verification_middleware.process_request(request)
self.assertIsNotNone(request.user)
self.assertFalse(request.user.is_anonymous())
# After password change, user should be anonymous def test_changed_password_doesnt_invalidate_session(self):
request.user.set_password('new_password') """
request.user.save() Changing a user's password shouldn't invalidate the session if session
verification_middleware.process_request(request) verification isn't activated.
self.assertIsNotNone(request.user) """
self.assertTrue(request.user.is_anonymous()) session_key = self.request.session.session_key
self.middleware.process_request(self.request)
self.assertIsNotNone(self.request.user)
self.assertFalse(self.request.user.is_anonymous())
# After password change, user should remain logged in.
self.user.set_password('new_password')
self.user.save()
self.middleware.process_request(self.request)
self.assertIsNotNone(self.request.user)
self.assertFalse(self.request.user.is_anonymous())
self.assertEqual(session_key, self.request.session.session_key)
def test_changed_password_invalidates_session_with_middleware(self):
with self.modify_settings(MIDDLEWARE_CLASSES={'append': ['django.contrib.auth.middleware.SessionAuthenticationMiddleware']}):
# After password change, user should be anonymous
self.user.set_password('new_password')
self.user.save()
self.middleware.process_request(self.request)
self.assertIsNotNone(self.request.user)
self.assertTrue(self.request.user.is_anonymous())
# session should be flushed
self.assertIsNone(self.request.session.session_key)

View File

@ -104,3 +104,7 @@ Bugfixes
* Fixed serialization of ``type`` when adding a ``deconstruct()`` method * Fixed serialization of ``type`` when adding a ``deconstruct()`` method
(:ticket:`23950`). (:ticket:`23950`).
* Prevented the
:class:`~django.contrib.auth.middleware.SessionAuthenticationMiddleware` from
setting a ``"Vary: Cookie"`` header on all responses.

View File

@ -1461,8 +1461,8 @@ Miscellaneous
* With the addition of the * With the addition of the
:class:`~django.contrib.auth.middleware.SessionAuthenticationMiddleware` to :class:`~django.contrib.auth.middleware.SessionAuthenticationMiddleware` to
the default project template, a database must be created before accessing the default project template (pre-1.7.2 only), a database must be created
a page using :djadmin:`runserver`. before accessing a page using :djadmin:`runserver`.
.. _deprecated-features-1.7: .. _deprecated-features-1.7: