提交 #790313: liangliangyy DjangoBlog <= 2.1.0.0 Security Misconfiguration + Hardcoded Credentials信息

标题liangliangyy DjangoBlog <= 2.1.0.0 Security Misconfiguration + Hardcoded Credentials
描述DjangoBlog through x.x.x.x configures ALLOWED_HOSTS with a wildcard '*' in djangoblog/settings.py, disabling Django's Host header validation. This allows HTTP Host header injection attacks including cache poisoning and password reset link hijacking.DjangoBlog through x.x.x.x has weak authentication on the file upload endpoint in blog/views.py. The /upload endpoint is decorated with @csrf_exempt and authenticates only via a static HMAC signature derived from the Django SECRET_KEY. Since the SECRET_KEY has a hardcoded fallback (see separate CVE for Vuln-3), the upload signature is computable by anyone, enabling unauthenticated arbitrary file uploads.
来源⚠️ https://github.com/3em0/cve_repo/blob/main/DjangoBlog/Vuln-11-Weak-File-Upload-Auth.md
用户
 Dem0 (UID 82596)
提交2026-03-26 17時52分 (25 日前)
管理2026-04-19 18時06分 (24 days later)
状态已接受
VulDB条目358246 [liangliangyy DjangoBlog 直到 2.1.0.0 File Upload Endpoint djangoblog/settings.py SECRET_KEY 弱加密]
积分20

Interested in the pricing of exploits?

See the underground prices here!