summaryrefslogtreecommitdiff
path: root/docs/ref/settings.txt
diff options
context:
space:
mode:
authorJake Howard <git@theorangeone.net>2026-04-01 15:47:30 +0100
committerJacob Walls <jacobtylerwalls@gmail.com>2026-04-07 10:33:38 -0400
commit1c584b0b1edd1def1e9aa4aef25fc5754f485616 (patch)
tree53fd6c2f86cc16f9fd15f981a4d9a4836a4d576b /docs/ref/settings.txt
parent3330dc2dd97f60ab32d3c912d2649859d063265c (diff)
Refs CVE-2026-33034 -- Improved security documentation on handling large request bodies.
Notably that the limit can be bypassed under ASGI.
Diffstat (limited to 'docs/ref/settings.txt')
-rw-r--r--docs/ref/settings.txt19
1 files changed, 12 insertions, 7 deletions
diff --git a/docs/ref/settings.txt b/docs/ref/settings.txt
index 320ec7f83e..cca7b18f24 100644
--- a/docs/ref/settings.txt
+++ b/docs/ref/settings.txt
@@ -1037,14 +1037,19 @@ The maximum size in bytes that a request body may be before a
:exc:`~django.core.exceptions.SuspiciousOperation` (``RequestDataTooBig``) is
raised. The check is done when accessing ``request.body`` or ``request.POST``
and is calculated against the total request size excluding any file upload
-data. You can set this to ``None`` to disable the check. Applications that are
-expected to receive unusually large form posts should tune this setting.
+data (``request.FILES``). You can set this to ``None`` to disable the check.
+Applications that are expected to receive unusually large form posts should
+tune this setting.
-The amount of request data is correlated to the amount of memory needed to
-process the request and populate the GET and POST dictionaries. Large requests
-could be used as a denial-of-service attack vector if left unchecked. Since web
-servers don't typically perform deep request inspection, it's not possible to
-perform a similar check at that level.
+Under ASGI, the entire request may be spooled to disk before this limit is
+enforced. Therefore, it is strongly recommended to place additional protections
+in front of Django which limit the entire request payload.
+
+The amount of request data is correlated to the amount of memory or storage
+needed to process the request and populate the GET and POST dictionaries.
+Large requests could be used as a denial-of-service attack vector if left
+unchecked. Since web servers don't typically perform deep request inspection,
+it's not possible to perform a similar check at that level.
See also :setting:`FILE_UPLOAD_MAX_MEMORY_SIZE`.