]> git.ipfire.org Git - thirdparty/Python/cpython.git/commit
[3.12] Added a warning to the urljoin docs, indicating that it is not safe to use...
authorMiss Islington (bot) <31488909+miss-islington@users.noreply.github.com>
Fri, 15 Nov 2024 23:17:37 +0000 (00:17 +0100)
committerGitHub <noreply@github.com>
Fri, 15 Nov 2024 23:17:37 +0000 (23:17 +0000)
commit797a6327cc8974bb6a692b0761d425392776ae6f
tree761a03a3d5e86cea257e5d4b21772b80d525caee
parentd0d892f7a320fa5baf3f304c94d02056b19a9799
[3.12] Added a warning to the urljoin docs, indicating that it is not safe to use with attacker controlled URLs (GH-126659) (#126889)

Added a warning to the urljoin docs, indicating that it is not safe to use with attacker controlled URLs (GH-126659)

This was flagged to me at a party today by someone who works in red-teaming as a frequently encountered footgun. Documenting the potentially unexpected behavior seemed like a good place to start.
(cherry picked from commit d6bcc154e93a0a20ab97187d3e8b726fffb14f8f)

Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
Doc/library/urllib.parse.rst