#30070: Content spoofing possiblity in default 404 page
-------------------------------------------+------------------------
               Reporter:  tasn             |          Owner:  nobody
                   Type:  Bug              |         Status:  new
              Component:  Core (Other)     |        Version:  1.11
               Severity:  Release blocker  |       Keywords:
           Triage Stage:  Accepted         |      Has patch:  1
    Needs documentation:  0                |    Needs tests:  0
Patch needs improvement:  1                |  Easy pickings:  0
                  UI/UX:  0                |
-------------------------------------------+------------------------
 A maliciously crafted URL can be reflected back to the user so that the
 user sees a 404 page with the attacker's content that may be interpreted
 as  originating from the trusted site.

 [https://github.com/django/django/pull/10809 PR] with details.

-- 
Ticket URL: <https://code.djangoproject.com/ticket/30070>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.

-- 
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to django-updates+unsubscr...@googlegroups.com.
To post to this group, send email to django-updates@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/django-updates/047.45313d31558ab472bd2e7895ffd50013%40djangoproject.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to