Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8vwh-pr89-4mw2

Опубликовано: 13 дек. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.7

Описание

Laravel Pulse Allows Remote Code Execution via Unprotected Query Method

A vulnerability has been discovered in Laravel Pulse that could allow remote code execution through the public remember() method in the Laravel\Pulse\Livewire\Concerns\RemembersQueries trait. This method is accessible via Livewire components and can be exploited to call arbitrary callables within the application.

Impact

An authenticated user with access to Laravel Pulse dashboard can execute arbitrary code by calling any function or static method that meets the following criteria:

  • The callable is a function or static method
  • The callable has no parameters or no strict parameter types

Vulnerable Components

  • The remember(callable $query, string $key = '') method in Laravel\Pulse\Livewire\Concerns\RemembersQueries
  • Affects all Pulse card components that use this trait

Attack Vectors

The vulnerability can be exploited through Livewire component interactions, for example:

wire:click="remember('\\Illuminate\\Support\\Facades\\Config::all', 'config')"

Credit

Thank you to Jeremy Angele for reporting this vulnerability.

Пакеты

Наименование

laravel/pulse

composer
Затронутые версииВерсия исправления

< 1.3.1

1.3.1

EPSS

Процентиль: 97%
0.38836
Средний

8.7 High

CVSS4

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 8.8
nvd
около 1 года назад

Laravel Pulse is a real-time application performance monitoring tool and dashboard for Laravel applications. A vulnerability has been discovered in Laravel Pulse prior to version 1.3.1 that could allow remote code execution through the public `remember()` method in the `Laravel\Pulse\Livewire\Concerns\RemembersQueries` trait. This method is accessible via Livewire components and can be exploited to call arbitrary callables within the application. An authenticated user with access to Laravel Pulse dashboard can execute arbitrary code by calling any function or static method in which the callable is a function or static method and the callable has no parameters or no strict parameter types. The vulnerable to component is `remember(callable $query, string $key = '')` method in `Laravel\Pulse\Livewire\Concerns\RemembersQueries`, and the vulnerability affects all Pulse card components that use this trait. Version 1.3.1 contains a patch.

CVSS3: 8.8
fstec
больше 1 года назад

Уязвимость функции remember() инструмента для мониторинга производительности и анализа использования приложений Laravel Pulse, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 97%
0.38836
Средний

8.7 High

CVSS4

Дефекты

CWE-94