diff options
| author | David Smith <smithdc@gmail.com> | 2025-05-27 17:37:22 +0100 |
|---|---|---|
| committer | nessita <124304+nessita@users.noreply.github.com> | 2025-08-25 10:51:10 -0300 |
| commit | 6f8e23d1c10c7ce32cea82b65ad2af640015f147 (patch) | |
| tree | 692a42d2a3c54a6610b17cc14679734973d98d89 /docs/topics/security.txt | |
| parent | ef2f16bc4824ca2b10b7f2845baf4d313c9c0da1 (diff) | |
Refs #36485 -- Removed unnecessary parentheses in :meth: and :func: roles in docs.
Diffstat (limited to 'docs/topics/security.txt')
| -rw-r--r-- | docs/topics/security.txt | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/docs/topics/security.txt b/docs/topics/security.txt index 272206da54..754be0b495 100644 --- a/docs/topics/security.txt +++ b/docs/topics/security.txt @@ -188,9 +188,9 @@ cache poisoning attacks, and poisoning links in emails. Because even seemingly-secure web server configurations are susceptible to fake ``Host`` headers, Django validates ``Host`` headers against the :setting:`ALLOWED_HOSTS` setting in the -:meth:`django.http.HttpRequest.get_host()` method. +:meth:`django.http.HttpRequest.get_host` method. -This validation only applies via :meth:`~django.http.HttpRequest.get_host()`; +This validation only applies via :meth:`~django.http.HttpRequest.get_host`; if your code accesses the ``Host`` header directly from ``request.META`` you are bypassing this security protection. |
