-
-
Notifications
You must be signed in to change notification settings - Fork 220
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
[Security] PostgreSQL backup leaks password in command-line #384
Comments
# for free
to join this conversation on GitHub.
Already have an account?
# to comment
The PostgreSQL dumping code produces a database URI that is then passed verbatim on the pg_dump command-line.
Command lines are considered public, because normally, everyone with shell access to a system can read them (by calling
ps
or looking inside/proc
).All utilities using libpq can be configured using environment variables for this exact reason, which I will propose in a merge request.
As of Django 3.2, the
DatabaseClient
class will have asettings_to_cmd_args_env
method that does exactly this, but we cannot yet use it for backwards compatibility.The text was updated successfully, but these errors were encountered: