Vulnerability CVE-2017-16894


Published: 2017-11-19   Modified: 2017-11-20

Description:
In Laravel framework through 5.5.21, remote attackers can obtain sensitive information (such as externally usable passwords) via a direct request for the /.env URI. NOTE: this CVE is only about Laravel framework's writeNewEnvironmentFileWith function in src/Illuminate/Foundation/Console/KeyGenerateCommand.php, which uses file_put_contents without restricting the .env permissions. The .env filename is not used exclusively by Laravel framework.

See advisories in our WLB2 database:
Topic
Author
Date
High
PHP Laravel Framework Token Unserialize Remote Command Execution
aushack
16.07.2019

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Laravel -> Laravel 

 References:
http://whiteboyz.xyz/laravel-env-file-vuln.html
https://twitter.com/finnwea/status/967709791442341888

Copyright 2024, cxsecurity.com

 

Back to Top