#36470: Potential log injection in development server (runserver) logging
-------------------------------------+-------------------------------------
     Reporter:  Natalia Bidart       |                    Owner:
         Type:                       |  YashRaj1506
  Cleanup/optimization               |                   Status:  assigned
    Component:  Core (Management     |                  Version:  dev
  commands)                          |
     Severity:  Normal               |               Resolution:
     Keywords:  runserver            |             Triage Stage:  Accepted
  log_message                        |
    Has patch:  1                    |      Needs documentation:  0
  Needs tests:  0                    |  Patch needs improvement:  0
Easy pickings:  0                    |                    UI/UX:  0
-------------------------------------+-------------------------------------
Changes (by houston0222):

 * has_patch:  0 => 1

Comment:

 Submitted a PR to address this issue:
 https://github.com/django/django/pull/19592

 This patch strips ANSI escape codes from log_message() arguments in the
 development server to prevent terminal log injection.
 It includes a regression test to verify the behavior.
-- 
Ticket URL: <https://code.djangoproject.com/ticket/36470#comment:6>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.

-- 
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/d/msgid/django-updates/01070197a8c56e3a-8fb6a0b8-9a3c-426f-b57d-94d274bf4e77-000000%40eu-central-1.amazonses.com.

Reply via email to