Laravel - Remote Code Execution (CVE-2021-3129)
- Severity
- CVSSv3 Score
- 9.8
- Vulnerability description
Laravel framework is affected by a Remote Code Execution, located in the
/_ignition/execute-solution
endpoint. The root cause of this vulnerability is insecure usage of PHP functionsfile_get_content()
andfile_put_content()
, which can be used for log poisoning. The versions affected are below 8.4.2 release, with the ignition mode versions below 2.5.2 release.- Risk description
The risk exists that a remote unauthenticated attacker can fully compromise the server in order to steal confidential information, install ransomware, or pivot to the internal network.
- Exploit capabilities
Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.
- Recommendation
Upgrade the Laravel framework to a version higher than 8.4.2 and upgrade ignition mode to a version higher or equal with 2.5.2.
- Codename
- Not available
- Detectable with
- Network Scanner
- Exploitable with Sniper
- Yes
- Vuln date
- Jan 2021
- Published at
- Updated at
- Software Type
- Web framework
- Vendor
- Laravel
- Product
- Laravel