제출 #790313: liangliangyy DjangoBlog <= 2.1.0.0 Security Misconfiguration + Hardcoded Credentials정보

제목liangliangyy DjangoBlog <= 2.1.0.0 Security Misconfiguration + Hardcoded Credentials
설명DjangoBlog through x.x.x.x configures ALLOWED_HOSTS with a wildcard '*' in djangoblog/settings.py, disabling Django's Host header validation. This allows HTTP Host header injection attacks including cache poisoning and password reset link hijacking.DjangoBlog through x.x.x.x has weak authentication on the file upload endpoint in blog/views.py. The /upload endpoint is decorated with @csrf_exempt and authenticates only via a static HMAC signature derived from the Django SECRET_KEY. Since the SECRET_KEY has a hardcoded fallback (see separate CVE for Vuln-3), the upload signature is computable by anyone, enabling unauthenticated arbitrary file uploads.
원천⚠️ https://github.com/3em0/cve_repo/blob/main/DjangoBlog/Vuln-11-Weak-File-Upload-Auth.md
사용자
 Dem0 (UID 82596)
제출2026. 03. 26. PM 05:52 (26 날 ago)
모더레이션2026. 04. 19. PM 06:06 (24 days later)
상태수락
VulDB 항목358246 [liangliangyy DjangoBlog 까지 2.1.0.0 File Upload Endpoint djangoblog/settings.py SECRET_KEY 약한 암호화]
포인트들20

Want to know what is going to be exploited?

We predict KEV entries!