# N/A
## 漏洞概述
Laravel Framework特定版本中存在远程代码执行漏洞,原因是通过对潜在不可信的X-XSRF-TOKEN值进行反序列化调用。此漏洞涉及`Illuminate/Encryption/Encrypter.php`中的`decrypt`方法和`phpggc`中的`PendingBroadcast`。
## 影响版本
- Laravel Framework 5.5.0 - 5.5.40
- Laravel Framework 5.6.0 - 5.6.29
## 漏洞细节
攻击者可以通过对`X-XSRF-TOKEN`值进行反序列化,利用该漏洞实现远程代码执行。该过程涉及`Illuminate/Encryption/Encrypter.php`文件中的`decrypt`方法以及`phpggc`库中的`PendingBroadcast`类。
## 影响
为了利用该漏洞,攻击者必须知道应用程序密钥,这在正常情况下不会发生,但如果有先前的特权访问或已成功地执行了其他攻击,则可能发生这种情况。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | PoC for CVE-2018-15133 (Laravel unserialize vulnerability) | https://github.com/kozmic/laravel-poc-CVE-2018-15133 | POC详情 |
2 | Cette exploit en python va vous permettre de créer des listes de sites et les exploiter rapidement. | https://github.com/Bilelxdz/Laravel-CVE-2018-15133 | POC详情 |
3 | Laravel-PHP-Unit-RCE (CVE-2018-15133) Auto Exploiter and Shell Uploader | https://github.com/Prabesh01/Laravel-PHP-Unit-RCE-Auto-shell-uploader | POC详情 |
4 | CVE-2018-15133 (Webased) | https://github.com/bukitbarisan/laravel-rce-cve-2018-15133 | POC详情 |
5 | An automated PoC for CVE 2018-15133 | https://github.com/AlienX2001/better-poc-for-CVE-2018-15133 | POC详情 |
6 | Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133) | https://github.com/aljavier/exploit_laravel_cve-2018-15133 | POC详情 |
7 | Laravel RCE exploit. CVE-2018-15133 | https://github.com/pwnedshell/Larascript | POC详情 |
8 | None | https://github.com/AzhariKun/CVE-2018-15133 | POC详情 |
9 | "Lavel Exploit CVE-2018-15133 is a powerful exploit that allows attackers to gain unauthorized access to vulnerable systems. This exploit was originally developed as part of a Capture The Flag (CTF) challenge and has since been used by security researchers and ethical hackers to identify and address vulnerabilities in web applications. | https://github.com/NatteeSetobol/CVE-2018-15133-Lavel-Expliot | POC详情 |
10 | None | https://github.com/0xSalle/cve-2018-15133 | POC详情 |
11 | None | https://github.com/yeahhbean/Laravel-CVE-2018-15133 | POC详情 |
暂无评论