#30285: The domain in broken link emails can be spoofed
------------------------------+--------------------------------------
     Reporter:  orlnub123     |                    Owner:  nobody
         Type:  Bug           |                   Status:  closed
    Component:  Core (Other)  |                  Version:  master
     Severity:  Normal        |               Resolution:  wontfix
     Keywords:  middleware    |             Triage Stage:  Unreviewed
    Has patch:  1             |      Needs documentation:  0
  Needs tests:  0             |  Patch needs improvement:  0
Easy pickings:  0             |                    UI/UX:  0
------------------------------+--------------------------------------
Changes (by Carlton Gibson):

 * status:  new => closed
 * resolution:   => wontfix


Comment:

 Grrr, happy to discuss options but, I think we have to say `wontfix` here:
 we can't introduce a dependency on `contrib.sites` in `middleware.common`.

 If it weren't for that, I'd probably say, "It's a bit tenuous, but OK, if
 you're going to fix it". So, question, any ''fix'' that doesn't depend on
 the sites framework?

 (Given that the only ''spoof-able'' domains must be in `ALLOWED_HOSTS` and
 the affected function is `mail_managers()` I can't see that we need to
 take Herculean measures here...)

-- 
Ticket URL: <https://code.djangoproject.com/ticket/30285#comment:1>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.

-- 
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to django-updates+unsubscr...@googlegroups.com.
To post to this group, send email to django-updates@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/django-updates/067.e96dfbc0d2272bd0d0f3c2927b92cd7a%40djangoproject.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to