CISA KEV 정보
| 취약점명 | Laravel Deserialization of Untrusted Data Vulnerability |
|---|---|
| 설명 | Laravel Framework contains a deserialization of untrusted data vulnerability, allowing for remote command execution. This vulnerability may only be exploited if a malicious user has accessed the application encryption key (APP_KEY environment variable). |
| 조치사항 | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-502 |
| 등록일 (KEV) | 2024-01-16 |
| 조치 기한 | 2024-02-06 |
| 추가 참고 | https://laravel.com/docs/5.6/upgrade#upgrade-5.6.30; https://nvd.nist.gov/vuln/detail/CVE-2018-15133 |
NVD 상세 정보
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HAV:N/AC:M/Au:N/C:P/I:P/A:P설명: In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack.
CWE: CWE-502 | CWE-502
참조
- http://packetstormsecurity.com/files/153641/PHP-Laravel-Framework-Token-Unserialize-Remote-Command-Execution.html [Exploit, Third Party Advisory, VDB Entry]
- https://laravel.com/docs/5.6/upgrade#upgrade-5.6.30 [Vendor Advisory]
- http://packetstormsecurity.com/files/153641/PHP-Laravel-Framework-Token-Unserialize-Remote-Command-Execution.html [Exploit, Third Party Advisory, VDB Entry]
- https://laravel.com/docs/5.6/upgrade#upgrade-5.6.30 [Vendor Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-15133 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.