Логотип exploitDog
bind:CVE-2024-47823
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-47823

Количество 3

Количество 3

nvd логотип

CVE-2024-47823

больше 1 года назад

Livewire is a full-stack framework for Laravel that allows for dynamic UI components without leaving PHP. In livewire/livewire prior to `2.12.7` and `v3.5.2`, the file extension of an uploaded file is guessed based on the MIME type. As a result, the actual file extension from the file name is not validated. An attacker can therefore bypass the validation by uploading a file with a valid MIME type (e.g., `image/png`) and a “.php” file extension. If the following criteria are met, the attacker can carry out an RCE attack: 1. Filename is composed of the original file name using `$file->getClientOriginalName()`. 2. Files stored directly on your server in a public storage disk. 3. Webserver is configured to execute “.php” files. This issue has been addressed in release versions `2.12.7` and `3.5.2`. All users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-f3cx-396f-7jqp

больше 1 года назад

Livewire Remote Code Execution on File Uploads

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2025-01106

больше 1 года назад

Уязвимость библиотеки Livewire PHP-фреймворка Laravel, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-47823

Livewire is a full-stack framework for Laravel that allows for dynamic UI components without leaving PHP. In livewire/livewire prior to `2.12.7` and `v3.5.2`, the file extension of an uploaded file is guessed based on the MIME type. As a result, the actual file extension from the file name is not validated. An attacker can therefore bypass the validation by uploading a file with a valid MIME type (e.g., `image/png`) and a “.php” file extension. If the following criteria are met, the attacker can carry out an RCE attack: 1. Filename is composed of the original file name using `$file->getClientOriginalName()`. 2. Files stored directly on your server in a public storage disk. 3. Webserver is configured to execute “.php” files. This issue has been addressed in release versions `2.12.7` and `3.5.2`. All users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 9.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-f3cx-396f-7jqp

Livewire Remote Code Execution on File Uploads

CVSS3: 7.5
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2025-01106

Уязвимость библиотеки Livewire PHP-фреймворка Laravel, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
0%
Низкий
больше 1 года назад

Уязвимостей на страницу