• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

mattupstate / flask-security / 874 / 5
28%
develop: 28%

Build:
DEFAULT BRANCH: develop
Ran 06 Oct 2017 11:08AM UTC
Files 20
Run time 0s
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

06 Oct 2017 11:02AM UTC coverage: 93.923% (+0.009%) from 93.914%
REQUIREMENTS=lowest

push

travis-ci

Jiri Kuncar
Fix timing attack on login form

As detailed in #357 the time it takes to process a login request is
considerably less if the user specified doesn't exist than if the
password is incorrect. This can be used as a user enumeration attack,
even if the login error messages were customized to avoid this.

I fixed it by increasing the response time of a non-existing user
request by hashing the given password anyway (if using good
password hashing algorithm this is what takes a relatively
large amount of time and makes the attack possibly).

closes #357

1360 of 1448 relevant lines covered (93.92%)

0.94 hits per line

Source Files on job 874.5 (REQUIREMENTS=lowest)
  • Tree
  • List 0
  • Changed 1
  • Source Changed 1
  • Coverage Changed 1
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Build 874
  • Travis Job 874.5
  • 59c0fb7b on github
  • Prev Job for REQUIREMENTS=lowest on develop (#873.3)
  • Next Job for REQUIREMENTS=lowest on develop (#875.1)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc