| 156 | | Thank you for your report. After review, we've determined that the reported issue only affects workflows that process user input without sanitization. As documented at [0]: |
| 157 | | |
| 158 | | "Reports based on a failure to sanitize user input are not valid security vulnerabilities. It is the developer’s responsibility to properly handle user input." |
| 159 | | |
| 160 | | If using the `Remote-User` header for authentication, it's critical that it not be allowed through clients. Whatever intermediary proxy is handling the authentication should strip out the header from all requests. Because of this, the behavior you reported is not considered a security issue within the Django project. |
| 161 | | |
| 162 | | For further details, you can review and help in https://code.djangoproject.com/ticket/36862. |
| 163 | | |
| 164 | | Thanks for taking the time to submit it through the appropriate channel. |
| 165 | | |
| 166 | | Kind regards, the Django Security Team. |
| | 156 | Thank you for your report. After review, we have determined that this behavior results from deploying `RemoteUserMiddleware` without a trusted upstream component responsible for authentication and header sanitization. As documented in our security policy [0], issues that arise from failing to properly handle or restrict user-controlled input are not considered security vulnerabilities in Django itself. |
| | 157 | |
| | 158 | `RemoteUserMiddleware` is designed to rely on a trusted front-end server that performs authentication and sets or strips the relevant header. If Django is deployed in a configuration where clients can supply that header directly, this represents a deployment misconfiguration rather than a flaw in Django. |
| | 159 | |
| | 160 | For ongoing discussion about improving documentation clarity around this topic, please see ticket #36862: https://code.djangoproject.com/ticket/36862 |
| | 161 | |
| | 162 | For these reasons, we are closing this report. |
| | 163 | |
| | 164 | Kind regards, |
| | 165 | The Django Security Team |