Django-hijack

Latest version: v3.7.0

Safety actively analyzes 681866 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 11 of 11

1.0.8

- Added RemoteUser support, for more information see the [FAQ](https://github.com/arteria/django-hijack#support-for-custom-user-models)
- Fixed hide button to redirects to correct full path
- [Custom hijack function](https://github.com/arteria/django-hijack#support-for-custom-user-models)

**NOTE**: Be careful using the [new custom hijack function](https://github.com/arteria/django-hijack#custom-hijack-function), this can cause serious security vulnerabilities!

1.0.7

Security update.
We recommend you to update django-hijack to the latest version.
- HTML tags, are now rendered with escaping

1.0.6

Not secure
- Do not allow staff users to hijack superusers
- Add setting to choose which user attributes can be used for hijacking a user
- Use a more liberal/naive approach to regex checking for an email
- Code cleanup
- Check staff status against logged in user instead the user being hijacked (bugfix)
- Only include 'disable-hijack-warning' url if HIJACK_NOTIFY_ADMIN is enabled

1.0.5

Not secure
- Fixed error in dependency
- Correct classifiers in setup.py

1.0.4

Not secure
- Python3 support
- Travis CI Testing

Find django-hijack also on [PyPI](https://pypi.python.org/pypi/django-hijack/1.0.4).

1.0.3

Not secure

Page 11 of 11

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.