|
Task Description
Severity: High Due to public exposure of credentials, cryptographic secrets, and insecure runtime configurations.
Affected Component: Django application configuration file: settings.py Public GitHub repository (source code exposure)
Vulnerability Summary: The application’s Django configuration file (settings.py) contains multiple sensitive secrets and insecure configurations that are publicly accessible via a GitHub repository. These include: Hardcoded database credentials (username & password) External database host information Hardcoded Django SECRET_KEY Debug mode enabled (DEBUG = True) Although some configurations are commented, they are still exposed to anyone with access to the repository, which represents a serious security risk.
Description: The Django SECRET_KEY, which is used for cryptographic signing and session security, is hardcoded in a publicly accessible repository. SECRET_KEY = 'django-insecure-yt()50-c2ul547)8_eu$%@o7)-w=aj809ocuparihd#b+)_70w'
MySQL Database Credentials (Critical)
# DATABASES = { # 'default': { # 'ENGINE': 'django.db.backends.mysql', # 'NAME': 'secu_bdd', # 'USER': 'secu', # 'PASSWORD': '<REDACTED>', # 'HOST': 'mysql-polytech.alwaysdata.net', # 'PORT': '3306', # } # }
Githuh Url: https://github.com/<REDACTED> ( you can check it
Also i have attached some pictures of it you can check it…..
Impact: Unauthorized database access Disclosure of sensitive user data Data modification or deletion Potential full application compromise High likelihood of credential reuse across environments
|