| 제목 | liangliangyy DjangoBlog <= 2.1.0.0 Command Injection |
|---|
| 설명 | DjangoBlog through x.x.x.x allows remote code execution via the WeChat bot interface. The CommandHandler class in servermanager/api/commonapi.py passes user-supplied input directly to os.popen() without sanitization. The /robot endpoint is publicly accessible, the admin password is a hardcoded double-MD5 hash in djangoblog/settings.py (line 322), and the per-source-ID lockout mechanism can be trivially bypassed by rotating the message.source field. |
|---|
| 원천 | ⚠️ https://github.com/3em0/cve_repo/blob/main/DjangoBlog/Vuln-1-WeChat-Bot-RCE.md |
|---|
| 사용자 | Dem0 (UID 82596) |
|---|
| 제출 | 2026. 03. 26. PM 05:01 (30 날 ago) |
|---|
| 모더레이션 | 2026. 04. 19. AM 07:11 (24 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 358211 [liangliangyy DjangoBlog 까지 2.1.0.0 WeChat Bot Interface commonapi.py CommandHandler 원천 권한 상승] |
|---|
| 포인트들 | 20 |
|---|