#22493: Documentation for raw() and extra() should warn about SQL injection
--------------------------------------+--------------------
     Reporter:  erikr                 |      Owner:  nobody
         Type:  Cleanup/optimization  |     Status:  new
    Component:  Documentation         |    Version:  master
     Severity:  Normal                |   Keywords:
 Triage Stage:  Unreviewed            |  Has patch:  0
Easy pickings:  1                     |      UI/UX:  0
--------------------------------------+--------------------
 Using the
 
[https://docs.djangoproject.com/en/dev/topics/db/sql/#django.db.models.Manager.raw
 raw()] and
 [https://docs.djangoproject.com/en/dev/ref/models/querysets/#extra
 extra()] methods can result in SQL injection vulnerabilities, if not used
 carefully. However, the documentation does not mention this. The
 [https://docs.djangoproject.com/en/dev/topics/security/#sql-injection-
 protection Security in Django] document does include a warning regarding
 raw() and extra(), but I think a SQL injection is potentially so severe
 that we should also note this in the documentation for raw() and extra()
 itself.

-- 
Ticket URL: <https://code.djangoproject.com/ticket/22493>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.

-- 
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/django-updates/048.9fef83a6dd0cadc1ddfeec07fd744365%40djangoproject.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to