Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-16894

Опубликовано: 20 нояб. 2017
Источник: debian
EPSS Высокий

Описание

In Laravel framework through 5.5.21, remote attackers can obtain sensitive information (such as externally usable passwords) via a direct request for the /.env URI. NOTE: this CVE is only about Laravel framework's writeNewEnvironmentFileWith function in src/Illuminate/Foundation/Console/KeyGenerateCommand.php, which uses file_put_contents without restricting the .env permissions. The .env filename is not used exclusively by Laravel framework.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php-laravel-frameworknot-affectedpackage

Примечания

  • https://security.snyk.io/vuln/SNYK-PHP-LARAVELFRAMEWORK-72070

EPSS

Процентиль: 99%
0.85788
Высокий

Связанные уязвимости

CVSS3: 7.5
nvd
больше 7 лет назад

In Laravel framework through 5.5.21, remote attackers can obtain sensitive information (such as externally usable passwords) via a direct request for the /.env URI. NOTE: this CVE is only about Laravel framework's writeNewEnvironmentFileWith function in src/Illuminate/Foundation/Console/KeyGenerateCommand.php, which uses file_put_contents without restricting the .env permissions. The .env filename is not used exclusively by Laravel framework.

CVSS3: 7.5
github
около 3 лет назад

In Laravel framework through 5.5.21, remote attackers can obtain sensitive information (such as externally usable passwords) via a direct request for the /.env URI. NOTE: this CVE is only about Laravel framework's writeNewEnvironmentFileWith function in src/Illuminate/Foundation/Console/KeyGenerateCommand.php, which uses file_put_contents without restricting the .env permissions. The .env filename is not used exclusively by Laravel framework.

EPSS

Процентиль: 99%
0.85788
Высокий