You write:

"It could still be a vulnerability ... / It could fail to parse ... / could decide it's invalid - This is all pretty bad..."

I agree - this indeed would be really bad, if it can be used in malicious ways. But note that the fact that django or an upstream lib decided to slightly deviate from the latest URL parsing spec incarnation does not make it vulnerable per se. URL specs (or URI in general) used to contradict itself across various RFCs, so there is some ground of interpretation and which rules to follow in an implementation. Also django has to maintain backwards compat to some degree, and introducing a foreign c++ lib binding in its default installation is a very bold move.

Anything into this direction needs proper justification and not just handwaving arguments (FUD?), unless there actually is a real vulnerability with the current impl.

Cheers,
Jörg

--
You received this message because you are subscribed to the Google Groups "Django 
developers  (Contributions to Django itself)" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to django-developers+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/django-developers/726fce28-2273-4672-8e00-f8619b95b0d9%40netzkolchose.de.
  • ... 'Michael Lissner' via Django developers (Contributions to Django itself)
    • ... Dylan Reinhold
      • ... Jörg Breitbart
        • ... 'Adam Johnson' via Django developers (Contributions to Django itself)
          • ... 'Michael Lissner' via Django developers (Contributions to Django itself)
    • ... Adrián Salatino

Reply via email to