Описание
Laravel environment manipulation via query string
Description
When the register_argc_argv php
directive is set to on
, and users call any URL with a special crafted query string, they are able to change the environment used by the framework when handling the request.
Resolution
The framework now ignores argv values for environment detection on non-cli SAPIs.
Ссылки
- https://github.com/laravel/framework/security/advisories/GHSA-gv7v-rgg6-548h
- https://nvd.nist.gov/vuln/detail/CVE-2024-52301
- https://github.com/FriendsOfPHP/security-advisories/blob/master/laravel/framework/CVE-2024-52301.yaml
- https://github.com/advisories/GHSA-gv7v-rgg6-548h
- https://lists.debian.org/debian-lts-announce/2024/12/msg00019.html
Пакеты
laravel/framework
< 6.20.45
6.20.45
laravel/framework
>= 7.0.0, < 7.30.7
7.30.7
laravel/framework
>= 8.0.0, < 8.83.28
8.83.28
laravel/framework
>= 9.0.0, < 9.52.17
9.52.17
laravel/framework
>= 10.0.0, < 10.48.23
10.48.23
laravel/framework
>= 11.0.0, < 11.31.0
11.31.0
Связанные уязвимости
Laravel is a web application framework. When the register_argc_argv php directive is set to on , and users call any URL with a special crafted query string, they are able to change the environment used by the framework when handling the request. The vulnerability fixed in 6.20.45, 7.30.7, 8.83.28, 9.52.17, 10.48.23, and 11.31.0. The framework now ignores argv values for environment detection on non-cli SAPIs.
Laravel is a web application framework. When the register_argc_argv ph ...
Уязвимость конфигурации register_argc_argv = On PHP-фреймворка Laravel, позволяющая нарушителю оказать воздействие на целостность защищаемой информации