ok, i renamed cookie name,
but what about rename input name "csrfmiddlewaretoken" of {% csrf_token %}?
as i see it is harcoded?
http://stackoverflow.com/questions/27087626/rename-csrfmiddlewaretoken
вторник, 28 апреля 2015 г., 11:28:36 UTC+3 пользователь Vermus написал:
>
>
Oh, I missed this setting, stupid (i think, it is new for me, i'm using
django since 1.0)
thank you!
вторник, 28 апреля 2015 г., 10:51:11 UTC+3 пользователь Russell Keith-Magee
написал:
>
> Hi Vermus,
>
> Calling this a security "breach" is a bit inaccurate; but I
Hi, i found, that my site is detected
by http://trends.builtwith.com/framework/Django-CSRF by crfstoken header.
I think, it's security breach, when users know what framework is used on
server side.
There must have such web server tuning, that no one can detect framework
and server side programmi
> item = Item.objects.get(id=1)
> print 'item.value: %s' % item.value
> form = ItemModelForm(request.POST, instance=item)
> # NOTE: This fixes the problem:
> old_item = copy.deepcopy(item)
> if form.is_valid():
> print 'old_item.value: %s' % old_item.value
>
4 matches
Mail list logo