CVE-2017-16894

In Laravel framework through 5.5.21, remote attackers can obtain sensitive information (such as externally usable passwords) via a direct request for the /.env URI. NOTE: this CVE is only about Laravel framework's writeNewEnvironmentFileWith function in src/Illuminate/Foundation/Console/KeyGenerateCommand.php, which uses file_put_contents without restricting the .env permissions. The .env filename is not used exclusively by Laravel framework.
Configurations

Configuration 1 (hide)

cpe:2.3:a:laravel:laravel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:17

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/153641/PHP-Laravel-Framework-Token-Unserialize-Remote-Command-Execution.html - () http://packetstormsecurity.com/files/153641/PHP-Laravel-Framework-Token-Unserialize-Remote-Command-Execution.html -
References () http://whiteboyz.xyz/laravel-env-file-vuln.html - Third Party Advisory, URL Repurposed () http://whiteboyz.xyz/laravel-env-file-vuln.html - Third Party Advisory, URL Repurposed
References () https://twitter.com/finnwea/status/967709791442341888 - () https://twitter.com/finnwea/status/967709791442341888 -

14 Feb 2024, 01:17

Type Values Removed Values Added
References (MISC) http://whiteboyz.xyz/laravel-env-file-vuln.html - Third Party Advisory (MISC) http://whiteboyz.xyz/laravel-env-file-vuln.html - Third Party Advisory, URL Repurposed

Information

Published : 2017-11-20 01:29

Updated : 2024-11-21 03:17


NVD link : CVE-2017-16894

Mitre link : CVE-2017-16894

CVE.ORG link : CVE-2017-16894


JSON object : View

Products Affected

laravel

  • laravel
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor