diff options
| author | Nick Pope <nick@nickpope.me.uk> | 2021-02-16 10:14:17 +0000 |
|---|---|---|
| committer | Carlton Gibson <carlton.gibson@noumenal.es> | 2021-02-18 10:27:25 +0100 |
| commit | fd6b6afd5959b638c62dbf4839ccff97e7f7dfda (patch) | |
| tree | 2176e04f6cb953e08db56295ddb3ea219da1d084 /tests/handlers/test_exception.py | |
| parent | 226d8319181b94b093708b8cdd4ab5e257a79df6 (diff) | |
[2.2.x] Fixed CVE-2021-23336 -- Fixed web cache poisoning via django.utils.http.limited_parse_qsl().
Diffstat (limited to 'tests/handlers/test_exception.py')
| -rw-r--r-- | tests/handlers/test_exception.py | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/tests/handlers/test_exception.py b/tests/handlers/test_exception.py index 7afd4acc6b..0c1e763990 100644 --- a/tests/handlers/test_exception.py +++ b/tests/handlers/test_exception.py @@ -6,7 +6,7 @@ from django.test.client import FakePayload class ExceptionHandlerTests(SimpleTestCase): def get_suspicious_environ(self): - payload = FakePayload('a=1&a=2;a=3\r\n') + payload = FakePayload('a=1&a=2&a=3\r\n') return { 'REQUEST_METHOD': 'POST', 'CONTENT_TYPE': 'application/x-www-form-urlencoded', |
