إرسال #790281: liangliangyy DjangoBlog <= 2.1.0.0 Command Injectionالمعلومات

عنوانliangliangyy DjangoBlog <= 2.1.0.0 Command Injection
الوصفDjangoBlog through x.x.x.x allows remote code execution via the WeChat bot interface. The CommandHandler class in servermanager/api/commonapi.py passes user-supplied input directly to os.popen() without sanitization. The /robot endpoint is publicly accessible, the admin password is a hardcoded double-MD5 hash in djangoblog/settings.py (line 322), and the per-source-ID lockout mechanism can be trivially bypassed by rotating the message.source field.
المصدر⚠️ https://github.com/3em0/cve_repo/blob/main/DjangoBlog/Vuln-1-WeChat-Bot-RCE.md
المستخدم
 Dem0 (UID 82596)
ارسال26/03/2026 05:01 PM (1 شهر منذ)
الاعتدال19/04/2026 07:11 AM (24 days later)
الحالةتمت الموافقة
إدخال VulDB358211 [liangliangyy DjangoBlog حتى 2.1.0.0 WeChat Bot Interface commonapi.py CommandHandler المصدر تجاوز الصلاحيات]
النقاط20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!