Image for post
Image for post

Django docs suggests SecurityMiddleware is placed near the top of your settings for good reason: it performs a suite of security checks and enhancements that would otherwise leave your website to the mercy of some simple hacks


sets the header to to prevent hackers from tricking your website into executing a malicious javascript file that they uploaded.

This header indicate to the browser that the MIME types advertised in the Content-Type headers should not be changed (by “sniffing” the content). The sniffing feature is the browser being helpful when a developer or server misconfiguration misidentified the . If the browser respected an incorrect MIME type then a javascript, css, or image file would not work and the website would break. Very helpful feature. But it can be abused, as the following simple proof of concept shows:

# "",

SECURE_CONTENT_TYPE_NOSNIFF = False # pre-Django 3.0 it was False by default. Post 3.0 it's True

class HomePage(View):
def get(self, *args, **kwargs):
# simulate a misconfgured server that returns a response that has no content type
response = HttpResponse("<script>alert('hello world')</script>")
del response['Content-Type']
return response

The outcome when navigating to shows the "hack" worked:

Image for post
Image for post

This simple proof of concept simulated the following more complex situation:

  • A bad actor uploaded HTML containing javascript (maybe pretending to be an image file).
  • The file was served by your website but does not set MIME type in the Content-Type header
  • The browser inferred the MIME type based on the content
  • The browser executed the javascript

This would be avoided if we the is present and the feature is active:

"" ,
"django.middleware.common.CommonMiddleware" ,
"django.contrib.sessions.middleware.SessionMiddleware" ,

Then the browser does not fall for the trick:

Image for post
Image for post


sets the header to when is to enable the browser's built-in XSS protection.

This XSS protection has been mostly superseded by CSP. Older browsers still support this feature, but many browsers have removed this feature. Users with older browsers are still important to cater for because security of your website cannot assume everyone is running the latest version of Chrome.

Without the and then the website will not receive the benefit of being protected against the many possible XSS attacks.

Referrer Policy

sets the referer policy header based on , which impacts user privacy and is an attack vector for bad actors that aim to dupe users into thinking they are still on your website.

The referer header can be abused by the target website: maybe secrets in the your website URL is leaked. More convolutedly, maybe a bad actor can add a link to their website. The target can then read the referer header and style their website to look like your website. A user not paying attention may think they’re still on your website because:

  • your website linked to it
  • it looks like your website

So the user may then input credentials and personal details in the bad actor’s website.

This can be prevented by not exposing the referer header by settings , which is then handled by the .

SSL Redirect

SecurityMiddleware can redirect HTTP connections to HTTPS if is set to .

If you do not redirect HTTP to HTTPS then passwords and personal information will be transported over plaintext, and a Man In The Middle could read them.


See Hacking Django websites part 2: clickjacking

Does your website have security vulnerabilities?

Over time it’s easy for security vulnerabilities and tech debt to slip into your codebase. I can check it for for free you at I’m a Django code improvement bot:

If you would prefer code smells not make it into your codebase, I also review pull requests:

I’m a GitHub bot that automatically improves your Django.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store