-
-
Notifications
You must be signed in to change notification settings - Fork 219
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security] PostgreSQL backup leaks password in command-line #384
Comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
The PostgreSQL dumping code produces a database URI that is then passed verbatim on the pg_dump command-line.
Command lines are considered public, because normally, everyone with shell access to a system can read them (by calling
ps
or looking inside/proc
).All utilities using libpq can be configured using environment variables for this exact reason, which I will propose in a merge request.
As of Django 3.2, the
DatabaseClient
class will have asettings_to_cmd_args_env
method that does exactly this, but we cannot yet use it for backwards compatibility.The text was updated successfully, but these errors were encountered: