Skip to content
Projeler
Gruplar
Parçacıklar
Yardım
Yükleniyor...
Oturum aç / Kaydol
Gezinmeyi değiştir
D
django
Proje
Proje
Ayrıntılar
Etkinlik
Cycle Analytics
Depo (repository)
Depo (repository)
Dosyalar
Kayıtlar (commit)
Dallar (branch)
Etiketler
Katkıda bulunanlar
Grafik
Karşılaştır
Grafikler
Konular (issue)
0
Konular (issue)
0
Liste
Pano
Etiketler
Kilometre Taşları
Birleştirme (merge) Talepleri
0
Birleştirme (merge) Talepleri
0
CI / CD
CI / CD
İş akışları (pipeline)
İşler
Zamanlamalar
Grafikler
Paketler
Paketler
Wiki
Wiki
Parçacıklar
Parçacıklar
Üyeler
Üyeler
Collapse sidebar
Close sidebar
Etkinlik
Grafik
Grafikler
Yeni bir konu (issue) oluştur
İşler
Kayıtlar (commit)
Konu (issue) Panoları
Kenar çubuğunu aç
Batuhan Osman TASKAYA
django
Commits
f65eb15a
Kaydet (Commit)
f65eb15a
authored
Nis 25, 2014
tarafından
Tim Graham
Dosyalara gözat
Seçenekler
Dosyalara Gözat
İndir
Eposta Yamaları
Sade Fark
Fixed #22504 -- Corrected domain terminology in security guide.
Thanks chris at chrullrich.net.
üst
deb561bb
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
5 additions
and
5 deletions
+5
-5
security.txt
docs/topics/security.txt
+5
-5
No files found.
docs/topics/security.txt
Dosyayı görüntüle @
f65eb15a
...
...
@@ -237,11 +237,11 @@ User-uploaded content
you can take to mitigate these attacks:
1. One class of attacks can be prevented by always serving user uploaded
content from a distinct
Top Level Domain (TLD). This prevents any
exploit blocked by `same-origin policy`_ protections such as cross site
s
cripting. For example, if your site runs on ``example.com``, you would
w
ant to serve uploaded content (the :setting:`MEDIA_URL` setting) from
something like ``usercontent-example.com``. It's *not* sufficient to
content from a distinct
top-level or second-level domain. This prevents
any exploit blocked by `same-origin policy`_ protections such as cross
s
ite scripting. For example, if your site runs on ``example.com``, you
w
ould want to serve uploaded content (the :setting:`MEDIA_URL` setting)
from
something like ``usercontent-example.com``. It's *not* sufficient to
serve content from a subdomain like ``usercontent.example.com``.
2. Beyond this, applications may choose to define a whitelist of allowable
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment