Django debug enabled showing information about system, database, configuration files
Medium
G
Glovo
Submitted None
Actions:
Reported by
omarelfarsaoui
Vulnerability Details
Technical details and impact analysis
## Summary:
Hi team,
This subdomain `pulpo.it.glovoint.com` is a Django application running with debug mode turned on (DEBUG = True ).
One of the main features of debug mode is the display of detailed error pages to help developers.
If your app raises an exception when DEBUG is True, Django will display a detailed traceback, including a lot of metadata about your environment, such as all the currently defined Django settings.py file.
## Steps To Reproduce:
it's not complicated and needs some user interaction, using Burpsuite I send the POST request to `https://pulpo.it.glovoint.com/admin` path and I got 500 response.
The information leaked includes the following:
Django Version.
python Version
IP addresses
S3_URL
database (username, URL, type, port )
email addresses
## Supporting Material/References:
███
## Remediation:
Never deploy with DEBUG turned on.
To disable debug mode, set DEBUG=False in your Django settings.py file.
## Impact
An attacker can obtain information such as:
Django & Python version.
Used database type, database user name, and current database name.
Details of the Django project configuration.
Internal file paths.
Exception-generated source code, local variables and their values.
This information might help an attacker gain more information and potentially to focus on the development of further attacks on the target system.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Information Disclosure