Submit #790313: liangliangyy DjangoBlog <= 2.1.0.0 Security Misconfiguration + Hardcoded Credentialsinfo

Titleliangliangyy DjangoBlog <= 2.1.0.0 Security Misconfiguration + Hardcoded Credentials
DescriptionDjangoBlog through x.x.x.x configures ALLOWED_HOSTS with a wildcard '*' in djangoblog/settings.py, disabling Django's Host header validation. This allows HTTP Host header injection attacks including cache poisoning and password reset link hijacking.DjangoBlog through x.x.x.x has weak authentication on the file upload endpoint in blog/views.py. The /upload endpoint is decorated with @csrf_exempt and authenticates only via a static HMAC signature derived from the Django SECRET_KEY. Since the SECRET_KEY has a hardcoded fallback (see separate CVE for Vuln-3), the upload signature is computable by anyone, enabling unauthenticated arbitrary file uploads.
Source⚠️ https://github.com/3em0/cve_repo/blob/main/DjangoBlog/Vuln-11-Weak-File-Upload-Auth.md
User
 Dem0 (UID 82596)
Submission03/26/2026 17:52 (25 days ago)
Moderation04/19/2026 18:06 (24 days later)
StatusAccepted
VulDB entry358246 [liangliangyy DjangoBlog up to 2.1.0.0 File Upload Endpoint djangoblog/settings.py SECRET_KEY hard-coded key]
Points20

Do you need the next level of professionalism?

Upgrade your account now!