In Laravel framework through 5.5.21, remote attackers can obtain sensitive information (such as externally usable passwords) via a direct request for the /.env URI. NOTE: this CVE is only about Laravel framework's writeNewEnvironmentFileWith function in src/Illuminate/Foundation/Console/KeyGenerateCommand.php, which uses file_put_contents without restricting the .env permissions. The .env filename is not used exclusively by Laravel framework.
References
Configurations
History
21 Nov 2024, 03:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/153641/PHP-Laravel-Framework-Token-Unserialize-Remote-Command-Execution.html - | |
References | () http://whiteboyz.xyz/laravel-env-file-vuln.html - Third Party Advisory, URL Repurposed | |
References | () https://twitter.com/finnwea/status/967709791442341888 - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://whiteboyz.xyz/laravel-env-file-vuln.html - Third Party Advisory, URL Repurposed |
Information
Published : 2017-11-20 01:29
Updated : 2024-11-21 03:17
NVD link : CVE-2017-16894
Mitre link : CVE-2017-16894
CVE.ORG link : CVE-2017-16894
JSON object : View
Products Affected
laravel
- laravel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor