提出 #790313: liangliangyy DjangoBlog <= 2.1.0.0 Security Misconfiguration + Hardcoded Credentials情報

タイトルliangliangyy DjangoBlog <= 2.1.0.0 Security Misconfiguration + Hardcoded Credentials
説明DjangoBlog through x.x.x.x configures ALLOWED_HOSTS with a wildcard '*' in djangoblog/settings.py, disabling Django's Host header validation. This allows HTTP Host header injection attacks including cache poisoning and password reset link hijacking.DjangoBlog through x.x.x.x has weak authentication on the file upload endpoint in blog/views.py. The /upload endpoint is decorated with @csrf_exempt and authenticates only via a static HMAC signature derived from the Django SECRET_KEY. Since the SECRET_KEY has a hardcoded fallback (see separate CVE for Vuln-3), the upload signature is computable by anyone, enabling unauthenticated arbitrary file uploads.
ソース⚠️ https://github.com/3em0/cve_repo/blob/main/DjangoBlog/Vuln-11-Weak-File-Upload-Auth.md
ユーザー
 Dem0 (UID 82596)
送信2026年03月26日 17:52 (25 日 ago)
モデレーション2026年04月19日 18:06 (24 days later)
ステータス承諾済み
VulDBエントリ358246 [liangliangyy DjangoBlog 迄 2.1.0.0 File Upload Endpoint djangoblog/settings.py SECRET_KEY 弱い暗号化]
ポイント20

Might our Artificial Intelligence support you?

Check our Alexa App!