Skip to main content

Business information leak - Network Unit


Protection of sensitive business information from unauthorized access or disclosure


  • Usage of Python 3.0+ for developing Python applications
  • Usage of Django for building web applications in Python


Non compliant code

from django.http import HttpResponse
from .models import BusinessInfo

def business_info(request):
all_info = BusinessInfo.objects.all()
return HttpResponse(all_info)

The above Django view function business_info is vulnerable to business information leak. It fetches all the business information from the database and directly returns it as an HTTP response. This means that anyone who can make a request to this endpoint can access all the business information.

The BusinessInfo model might contain sensitive data such as financial details, business strategies, etc. Directly exposing this data through an endpoint is a severe security risk and can lead to information disclosure vulnerabilities.

In the context of network units, if this code is present in a network unit, an attacker could exploit this vulnerability to gather valuable information about the business. This could further enable them to perform more targeted attacks, cause financial loss, or damage the business's reputation.

Information leaks like this can also violate data protection laws and regulations, potentially leading to legal issues for the business.


  • First, avoid exposing all business information directly in the HttpResponse. This can lead to information leakage.
  • Instead of returning all business information, filter the data to only include what is necessary for the specific request.
  • Implement proper access controls to ensure that only authorized users can access the business information.
  • Use Django's built-in serialization to safely convert the QuerySet to a JSON response.
  • Consider using Django's built-in views for handling model data, such as ListView, which can provide additional security features.
  • Always sanitize and validate any user input to prevent SQL injection attacks.
  • Encrypt sensitive data in the database to add an extra layer of security.

Compliant code

from django.http import JsonResponse
from django.views import View
from django.core import serializers
from .models import BusinessInfo
from django.contrib.auth.decorators import login_required
from django.utils.decorators import method_decorator

@method_decorator(login_required, name='dispatch')
class BusinessInfoView(View):
def get(self, request):
all_info = BusinessInfo.objects.all()
data = serializers.serialize('json', all_info)
return JsonResponse(data, safe=False)

The updated code now uses Django's built-in JsonResponse and serializers to safely convert the QuerySet to a JSON response. This prevents the potential information leakage that could occur from directly exposing all business information in the HttpResponse.

The BusinessInfoView class is used instead of a function-based view. This class-based view provides more flexibility and additional security features. The get method is used to handle GET requests.

The @method_decorator(login_required, name='dispatch') decorator is used to ensure that only authenticated users can access the business information. This is a form of access control that prevents unauthorized access to sensitive data.

The login_required decorator is a built-in Django decorator that restricts access to views based on whether a user is authenticated or not. If a user is not authenticated, they are redirected to the login page.

The dispatch method is the first method called when processing any request in a class-based view. By applying the login_required decorator to dispatch, we ensure that the user must be logged in to access any method in the view.

The safe=False parameter in JsonResponse is used because we are passing in a serialized queryset, which is not a dictionary. By default, JsonResponse expects a dictionary. If you pass in any other data type, you must set safe=False.

Remember to always sanitize and validate any user input to prevent SQL injection attacks. Also, consider encrypting sensitive data in the database to add an extra layer of security.