@@ -11,7 +11,7 @@ msgid ""
1111msgstr ""
1212"Project-Id-Version : Python 3.13\n "
1313"Report-Msgid-Bugs-To : \n "
14- "POT-Creation-Date : 2026-03-25 15:54 +0000\n "
14+ "POT-Creation-Date : 2026-04-03 15:26 +0000\n "
1515"PO-Revision-Date : 2025-09-15 01:04+0000\n "
1616"Last-Translator : python-doc bot, 2025\n "
1717"Language-Team : Polish (https://app.transifex.com/python-doc/teams/5390/pl/)\n "
@@ -269,6 +269,9 @@ msgid ""
269269"`end_headers` MUST BE called in order to complete the operation."
270270msgstr ""
271271
272+ msgid "This method does not reject input containing CRLF sequences."
273+ msgstr ""
274+
272275msgid "Headers are stored in an internal buffer."
273276msgstr ""
274277
@@ -279,6 +282,9 @@ msgid ""
279282"message corresponding the response *code* is sent."
280283msgstr ""
281284
285+ msgid "This method does not reject *message* containing CRLF sequences."
286+ msgstr ""
287+
282288msgid ""
283289"Adds a blank line (indicating the end of the HTTP headers in the response) "
284290"to the headers buffer and calls :meth:`flush_headers`."
@@ -591,6 +597,13 @@ msgid ""
591597"directory to be served."
592598msgstr ""
593599
600+ msgid ""
601+ "Methods :meth:`BaseHTTPRequestHandler.send_header` and :meth:"
602+ "`BaseHTTPRequestHandler.send_response_only` assume sanitized input and does "
603+ "not perform input validation such as checking for the presence of CRLF "
604+ "sequences. Untrusted input may result in HTTP Header injection attacks."
605+ msgstr ""
606+
594607msgid ""
595608"Earlier versions of Python did not scrub control characters from the log "
596609"messages emitted to stderr from ``python -m http.server`` or the default :"
0 commit comments