view website/www/contents.txt @ 5924:b40059d7036f

issue2550925 strip HTTP_PROXY environment variable if deployed as CGI and client sends an http PROXY header, the tainted HTTP_PROXY environment variable is created. It can affect calls using requests package or curl. A roundup admin would have to write detectors/extensions that use these mechanisms. Not exploitable in default config. See: https://httpoxy.org/
author John Rouillard <rouilj@ieee.org>
date Sun, 13 Oct 2019 17:45:06 -0400
parents fefd8263ee4d
children c2fd254c9257
line wrap: on
line source

.. Roundup documentation master file, created by sphinx-quickstart on Tue Jan 20 17:33:20 2009.
   You can adapt this file completely to your liking, but it should at least
   contain the root `toctree` directive.

Sitemap
=======

Contents:

.. toctree::
   :maxdepth: 2

   Home <index>
   Download <https://pypi.org/project/roundup/>
   docs
   Issues <https://issues.roundup-tracker.org>
   contact
   Wiki <http://wiki.roundup-tracker.org>
   code

Indices and tables
==================

* :ref:`genindex`
* :ref:`modindex`
* :ref:`search`


Roundup Issue Tracker: http://roundup-tracker.org/