We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 57ff6a9 commit 0be4e58Copy full SHA for 0be4e58
1 file changed
Doc/library/wsgiref.rst
@@ -265,7 +265,6 @@ manipulation of WSGI response headers using a mapping-like interface.
265
266
Content-Disposition: attachment; filename="bud.gif"
267
268
- This method does not reject input containing CRLF sequences.
269
270
.. versionchanged:: 3.5
271
*headers* parameter is optional.
@@ -900,12 +899,3 @@ directory and port number (default: 8000) on the command line::
900
899
httpd.server_close()
901
902
903
-.. _wsgiref-security:
904
-
905
-Security considerations
906
------------------------
907
908
-The :class:`wsgiref.headers.Headers` class assumes sanitized input for header
909
-names and values and does not perform input validation such as checking for the
910
-presence of CRLF sequences. Untrusted input may result in CRLF injection
911
-attacks.
0 commit comments