إرسال #790288: liangliangyy DjangoBlog <= 2.1.0.0 Insecure Direct Object Referenceالمعلومات

عنوانliangliangyy DjangoBlog <= 2.1.0.0 Insecure Direct Object Reference
الوصفDjangoBlog through x.x.x.x has an Insecure Direct Object Reference (IDOR) vulnerability in oauth/views.py RequireEmailView. The oauthid parameter is accepted from the client-side form without verifying ownership. An attacker can tamper with the hidden oauthid field to hijack another user's OAuth social login identity, leading to account takeover via social authentication.
المصدر⚠️ https://github.com/3em0/cve_repo/blob/main/DjangoBlog/Vuln-6-OAuth-Email-Binding-IDOR.md
المستخدم
 Dem0 (UID 82596)
ارسال26/03/2026 05:12 PM (25 أيام منذ)
الاعتدال19/04/2026 06:06 PM (24 days later)
الحالةتمت الموافقة
إدخال VulDB358244 [liangliangyy DjangoBlog حتى 2.1.0.0 oauth/views.py form_valid oauthid تجاوز الصلاحيات]
النقاط19

Do you want to use VulDB in your project?

Use the official API to access entries easily!