Direct User Data in HttpResponse
User input from requests is directly concatenated into HttpResponse content without escaping.
XSS vulnerability in Django applications where user-controlled data is directly written to HttpResponse without proper escaping, bypassing Django's automatic template escaping and allowing script injection.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
User input from requests is directly concatenated into HttpResponse content without escaping.
Sourcery automatically identifies cross-site scripting (xss) via django httpresponse with user data and many other security issues in your codebase.