mirror of
https://github.com/django/django.git
synced 2025-08-03 18:38:50 +00:00
[3.1.x] Fixed #31696 -- Updated OWASP links in docs.
Backport of a16080810b
from master
This commit is contained in:
parent
2d3b6bce28
commit
ecd794bc68
5 changed files with 5 additions and 5 deletions
|
@ -66,7 +66,7 @@ Single object mixins
|
|||
non-sequential arguments. Using a unique slug may serve the same
|
||||
purpose, but this scheme allows you to have non-unique slugs.
|
||||
|
||||
.. _insecure direct object reference: https://www.owasp.org/index.php/Top_10_2013-A4-Insecure_Direct_Object_References
|
||||
.. _insecure direct object reference: https://wiki.owasp.org/index.php/Top_10_2013-A4-Insecure_Direct_Object_References
|
||||
|
||||
.. method:: get_object(queryset=None)
|
||||
|
||||
|
|
|
@ -872,7 +872,7 @@ Methods
|
|||
Use ``samesite='None'`` (string) to explicitly state that this cookie is
|
||||
sent with all same-site and cross-site requests.
|
||||
|
||||
.. _HttpOnly: https://www.owasp.org/index.php/HttpOnly
|
||||
.. _HttpOnly: https://owasp.org/www-community/HttpOnly
|
||||
.. _SameSite: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Set-Cookie/SameSite
|
||||
|
||||
.. versionchanged:: 3.1
|
||||
|
|
|
@ -3179,7 +3179,7 @@ vulnerability into full hijacking of a user's session. There aren't many good
|
|||
reasons for turning this off. Your code shouldn't read session cookies from
|
||||
JavaScript.
|
||||
|
||||
.. _HttpOnly: https://www.owasp.org/index.php/HttpOnly
|
||||
.. _HttpOnly: https://owasp.org/www-community/HttpOnly
|
||||
|
||||
.. setting:: SESSION_COOKIE_NAME
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue