django-secret-key: Django Secret Key Exposure

日期: 2025-08-01 | 影响软件: django-secret-key | POC: 已公开

漏洞描述

The Django settings.py file containing a secret key was discovered. An attacker may use the secret key to bypass many security mechanisms and potentially obtain other sensitive configuration information (such as database password) from the settings file.

PoC代码[已公开]

id: django-secret-key

info:
  name: Django Secret Key Exposure
  author: geeknik,DhiyaneshDk
  severity: high
  description: |
    The Django settings.py file containing a secret key was discovered. An attacker may use the secret key to bypass many security mechanisms and potentially obtain other sensitive configuration information (such as database password) from the settings file.
  reference:
    - https://docs.gitguardian.com/secrets-detection/detectors/specifics/django_secret_key
  classification:
    cpe: cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 7
    vendor: djangoproject
    product: django
    shodan-query: html:settings.py
    comments: 'This template downloads the manage.py file to check whether it contains line such as: `os.environ.setdefault("DJANGO_SETTINGS_MODULE", "APP_NAME.settings")` if it does, we extract the APP_NAME to know in what folder to look for the settings.py file.'
  tags: django,exposure,files,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/manage.py"
      - "{{BaseURL}}/settings.py"
      - "{{BaseURL}}/app/settings.py"
      - "{{BaseURL}}/django/settings.py"
      - "{{BaseURL}}/settings/settings.py"
      - "{{BaseURL}}/web/settings/settings.py"
      - "{{BaseURL}}/{{app_name}}/settings.py"

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "SECRET_KEY ="

      - type: word
        part: header
        words:
          - "text/html"
        negative: true

      - type: status
        status:
          - 200

    extractors:
      - type: regex
        part: body
        group: 1
        regex:
          - '"DJANGO_SECRET_KEY", "(.*)"'

      - type: regex
        part: body
        internal: true
        name: app_name
        group: 1
        regex:
          - "os.environ.setdefault\\([\"']DJANGO_SETTINGS_MODULE[\"'],\\s[\"']([a-zA-Z-_0-9]*).settings[\"']\\)"
# digest: 4a0a00473045022100a6a8ee3248ac72cd1dcfdca270d33586477953a8c3da4e2056cdeb40857fb19902202e6c799dedee7b91ee6c662ccaf2d613c644e593f90784d0f094cf6a7473dee4:922c64590222798bb761d5b6d8e72950