Submeter #790313: liangliangyy DjangoBlog <= 2.1.0.0 Security Misconfiguration + Hardcoded Credentialsinformação

Títuloliangliangyy DjangoBlog <= 2.1.0.0 Security Misconfiguration + Hardcoded Credentials
DescriçãoDjangoBlog through x.x.x.x configures ALLOWED_HOSTS with a wildcard '*' in djangoblog/settings.py, disabling Django's Host header validation. This allows HTTP Host header injection attacks including cache poisoning and password reset link hijacking.DjangoBlog through x.x.x.x has weak authentication on the file upload endpoint in blog/views.py. The /upload endpoint is decorated with @csrf_exempt and authenticates only via a static HMAC signature derived from the Django SECRET_KEY. Since the SECRET_KEY has a hardcoded fallback (see separate CVE for Vuln-3), the upload signature is computable by anyone, enabling unauthenticated arbitrary file uploads.
Fonte⚠️ https://github.com/3em0/cve_repo/blob/main/DjangoBlog/Vuln-11-Weak-File-Upload-Auth.md
Utilizador
 Dem0 (UID 82596)
Submissão26/03/2026 17h52 (há 25 dias)
Moderação19/04/2026 18h06 (24 days later)
EstadoAceite
Entrada VulDB358246 [liangliangyy DjangoBlog até 2.1.0.0 File Upload Endpoint djangoblog/settings.py SECRET_KEY Encriptação fraca]
Pontos20

Do you want to use VulDB in your project?

Use the official API to access entries easily!