Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-47823

Опубликовано: 08 окт. 2024
Источник: nvd
CVSS3: 9.8
EPSS Низкий

Описание

Livewire is a full-stack framework for Laravel that allows for dynamic UI components without leaving PHP. In livewire/livewire prior to 2.12.7 and v3.5.2, the file extension of an uploaded file is guessed based on the MIME type. As a result, the actual file extension from the file name is not validated. An attacker can therefore bypass the validation by uploading a file with a valid MIME type (e.g., image/png) and a “.php” file extension. If the following criteria are met, the attacker can carry out an RCE attack: 1. Filename is composed of the original file name using $file->getClientOriginalName(). 2. Files stored directly on your server in a public storage disk. 3. Webserver is configured to execute “.php” files. This issue has been addressed in release versions 2.12.7 and 3.5.2. All users are advised to upgrade. There are no known workarounds for this vulnerability.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:laravel:livewire:*:*:*:*:*:*:*:*
Версия до 2.12.7 (исключая)
cpe:2.3:a:laravel:livewire:*:*:*:*:*:*:*:*
Версия от 3.0.0 (включая) до 3.5.2 (исключая)

EPSS

Процентиль: 54%
0.00307
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-20
CWE-434

Связанные уязвимости

CVSS3: 7.5
github
больше 1 года назад

Livewire Remote Code Execution on File Uploads

CVSS3: 8.8
fstec
больше 1 года назад

Уязвимость библиотеки Livewire PHP-фреймворка Laravel, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 54%
0.00307
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-20
CWE-434