#22493: Documentation for raw() and extra() should warn about SQL injection
--------------------------------------+--------------------
Reporter: erikr | Owner: nobody
Type: Cleanup/optimization | Status: new
Component: Documentation | Version: master
Severity: Normal | Keywords:
Triage Stage: Unreviewed | Has patch: 0
Easy pickings: 1 | UI/UX: 0
--------------------------------------+--------------------
Using the
[https://docs.djangoproject.com/en/dev/topics/db/sql/#django.db.models.Manager.raw
raw()] and
[https://docs.djangoproject.com/en/dev/ref/models/querysets/#extra
extra()] methods can result in SQL injection vulnerabilities, if not used
carefully. However, the documentation does not mention this. The
[https://docs.djangoproject.com/en/dev/topics/security/#sql-injection-
protection Security in Django] document does include a warning regarding
raw() and extra(), but I think a SQL injection is potentially so severe
that we should also note this in the documentation for raw() and extra()
itself.
--
Ticket URL: <https://code.djangoproject.com/ticket/22493>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.
--
You received this message because you are subscribed to the Google Groups
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/django-updates/048.9fef83a6dd0cadc1ddfeec07fd744365%40djangoproject.com.
For more options, visit https://groups.google.com/d/optout.