| Description: | | Laravel’s debug mode exposes the ignition endpoint /_ignition/execute-solution, a legitimate troubleshooting interface that can be abused to invoke arbitrary solutions. By injecting a crafted phar:// stream wrapper path into the viewFile parameter, an attacker triggers PHP’s phar deserialization mechanism before the file is verified as existing. This allows instantiation of any class declared in the application or its dependencies, leading to remote code execution, file deletion, credential harvesting, or complete server takeover without authentication. The flaw was silently patched in January 2021 but remains attractive because many cloud and CI environments leave debug mode enabled, and the exploit leaves no error logs when successful. |