Skip to content

Commit 0be4e58

Browse files
committed
gh-142533: Remove vulnerability warnings from wsgiref module documentation since the issue was recently fixed
1 parent 57ff6a9 commit 0be4e58

File tree

1 file changed

+0
-10
lines changed

1 file changed

+0
-10
lines changed

Doc/library/wsgiref.rst

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -265,7 +265,6 @@ manipulation of WSGI response headers using a mapping-like interface.
265265

266266
Content-Disposition: attachment; filename="bud.gif"
267267

268-
This method does not reject input containing CRLF sequences.
269268

270269
.. versionchanged:: 3.5
271270
*headers* parameter is optional.
@@ -900,12 +899,3 @@ directory and port number (default: 8000) on the command line::
900899
httpd.server_close()
901900

902901

903-
.. _wsgiref-security:
904-
905-
Security considerations
906-
-----------------------
907-
908-
The :class:`wsgiref.headers.Headers` class assumes sanitized input for header
909-
names and values and does not perform input validation such as checking for the
910-
presence of CRLF sequences. Untrusted input may result in CRLF injection
911-
attacks.

0 commit comments

Comments
 (0)