|
|||
Rule General Information |
---|
Release Date: | 2024-11-26 | |
Rule Name: | PHP Laravel Framework Remote Command Execution Vulnerability (CVE-2018-15133) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | http://packetstormsecurity.com/files/153641/PHP-Laravel-Framework-Token-Unserialize-Remote-Command-Execution.html https://laravel.com/docs/5.6/upgrade#upgrade-5.6.30 |
|
Solutions |
---|
Refer to the announcement or patch by the vendor: https://laravel.com/docs/5.6/upgrade |