#36760: DisallowedRedirect triggering exceptions for simple bad bot traffic
------------------------+---------------------------------------
     Reporter:  minusf  |                     Type:  Bug
       Status:  new     |                Component:  Core (URLs)
      Version:  5.2     |                 Severity:  Normal
     Keywords:          |             Triage Stage:  Unreviewed
    Has patch:  0       |      Needs documentation:  0
  Needs tests:  0       |  Patch needs improvement:  0
Easy pickings:  0       |                    UI/UX:  0
------------------------+---------------------------------------
 The latest changes to DisallowedRedirect (CVE-2025-64458) are triggering
 thousands and thousands of exception emails and spam the logs when simple
 bad bot traffic is sending requests without a trailing slash and longer
 than `django.utils.http.MAX_URL_LENGTH`.

 Tangentionally the docstring for `DisallowedRedirect` is now out of
 date/incorrect:

 {{{
 class DisallowedRedirect(SuspiciousOperation):
     """Redirect to scheme not in allowed list"""
 }}}

 I feel like this is a bit overreacting and perhaps could be toned down
 somehow?
-- 
Ticket URL: <https://code.djangoproject.com/ticket/36760>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.

-- 
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/d/msgid/django-updates/0107019ad9096d97-7dfa3fef-fda0-4e61-b7cf-5d83f6f74755-000000%40eu-central-1.amazonses.com.

Reply via email to