• R. David Murray's avatar
    #5871: protect against header injection attacks. · 5b2d9ddf
    R. David Murray yazdı
    This makes Header.encode throw a HeaderParseError if it winds up
    formatting a header such that a continuation line has no leading
    whitespace and looks like a header.  Since Header accepts values
    containing newlines and preserves them (and this is by design), without
    this fix any program that took user input (say, a subject in a web form)
    and passed it to the email package as a header was vulnerable to header
    injection attacks.  (As far as we know this has never been exploited.)
    
    Thanks to Jakub Wilk for reporting this vulnerability.
    5b2d9ddf
Adı
Son kayıt (commit)
Son güncelleme
..
mime Loading commit data...
test Loading commit data...
__init__.py Loading commit data...
_parseaddr.py Loading commit data...
base64mime.py Loading commit data...
charset.py Loading commit data...
encoders.py Loading commit data...
errors.py Loading commit data...
feedparser.py Loading commit data...
generator.py Loading commit data...
header.py Loading commit data...
iterators.py Loading commit data...
message.py Loading commit data...
parser.py Loading commit data...
quoprimime.py Loading commit data...
utils.py Loading commit data...