# N/A
## 漏洞概述
Ignition 在 2.5.2 之前的版本中由于使用了不安全的 `file_get_contents()` 和 `file_put_contents()` 函数,允许未经身份验证的远程攻击者执行任意代码。这个问题影响了 Laravel 8.4.2 之前的版本。
## 影响版本
- Ignition 2.5.2 之前的所有版本
- Laravel 8.4.2 之前且启用调试模式的版本
## 细节
Ignition 在某些功能中使用了 `file_get_contents()` 和 `file_put_contents()` 函数,但其使用方式不安全,这导致攻击者可以利用这些漏洞来执行任意代码。
## 影响
该漏洞允许远程攻击者在 Laravel 等产品中执行任意代码,特别是在调试模式启用的情况下。这可能导致系统完全被控制,严重危害系统的安全性。
是否为 Web 类漏洞: 是
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Exploit for CVE-2021-3129 | https://github.com/ambionics/laravel-exploits | POC详情 |
| 2 | Laravel debug rce | https://github.com/SNCKER/CVE-2021-3129 | POC详情 |
| 3 | None | https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP | POC详情 |
| 4 | None | https://github.com/crisprss/Laravel_CVE-2021-3129_EXP | POC详情 |
| 5 | Exploit for CVE-2021-3129 | https://github.com/nth347/CVE-2021-3129_exploit | POC详情 |
| 6 | None | https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129 | POC详情 |
| 7 | Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129) | https://github.com/zhzyker/CVE-2021-3129 | POC详情 |
| 8 | CVE-2021-3129-Laravel Debug mode 远程代码执行漏洞 | https://github.com/simonlee-hello/CVE-2021-3129 | POC详情 |
| 9 | None | https://github.com/idea-oss/laravel-CVE-2021-3129-EXP | POC详情 |
| 10 | PoC for CVE-2021-3129 (Laravel) | https://github.com/knqyf263/CVE-2021-3129 | POC详情 |
| 11 | Add revert shell | https://github.com/cuongtop4598/CVE-2021-3129-Script | POC详情 |
| 12 | Laravel RCE (CVE-2021-3129) | https://github.com/joshuavanderpoll/CVE-2021-3129 | POC详情 |
| 13 | CVE-2021-3129 POC | https://github.com/shadowabi/Laravel-CVE-2021-3129 | POC详情 |
| 14 | Unauthenticated RCE in Laravel Debug Mode <8.4.2 | https://github.com/JacobEbben/CVE-2021-3129 | POC详情 |
| 15 | Laravel debug mode - Remote Code Execution (RCE) | https://github.com/hupe1980/CVE-2021-3129 | POC详情 |
| 16 | CVE-2021-3129-Laravel Debug mode | https://github.com/0nion1/CVE-2021-3129 | POC详情 |
| 17 | CVE-2021-3129 Exploit Checker By ./MrMad | https://github.com/MadExploits/Laravel-debug-Checker | POC详情 |
| 18 | Laravel Debug mode RCE漏洞(CVE-2021-3129)poc / exp | https://github.com/ajisai-babu/CVE-2021-3129-exp | POC详情 |
| 19 | Laravel RCE CVE-2021-3129 | https://github.com/keyuan15/CVE-2021-3129 | POC详情 |
| 20 | None | https://github.com/qaisarafridi/cve-2021-3129 | POC详情 |
| 21 | None | https://github.com/Zoo1sondv/CVE-2021-3129 | POC详情 |
| 22 | Laravel RCE (CVE-2021-3129) | https://github.com/miko550/CVE-2021-3129 | POC详情 |
| 23 | CVE-2021-3129 | Laravel Debug Mode Vulnerability | https://github.com/withmasday/CVE-2021-3129 | POC详情 |
| 24 | None | https://github.com/banyaksepuh/Mass-CVE-2021-3129-Scanner | POC详情 |
| 25 | None | https://github.com/Axianke/CVE-2021-3129 | POC详情 |
| 26 | A exploit script for CVE-2021-3129 | https://github.com/cc3305/CVE-2021-3129 | POC详情 |
| 27 | CVE-2021-3129 | Laravel Debug Mode Vulnerability | https://github.com/wmasday/CVE-2021-3129 | POC详情 |
| 28 | Laravel Debug Mode and Payload | https://github.com/piperpwn/CVE-2021-3129- | POC详情 |
| 29 | CVE-2021-3129-Laravel Debug mode 远程代码执行漏洞 | https://github.com/Y0s9/CVE-2021-3129 | POC详情 |
| 30 | CVE-2021-3129 Laravel Ignition RCE Exploit | https://github.com/0x0d3ad/CVE-2021-3129 | POC详情 |
| 31 | None | https://github.com/GodOfServer/CVE-2021-3129 | POC详情 |
| 32 | Modified version of laravel ignition RCE (CVE-2021-3129) exploit script for Hour of Hack Session-4 | https://github.com/Prabesh01/hoh4 | POC详情 |
| 33 | ## About The script has been made for exploiting the Laravel RCE (CVE-2021-3129) vulnerability.<br> This script allows you to write/execute commands on a website running <b>Laravel <= v8.4.2</b>, that has "APP_DEBUG" set to "true" in its ".env" file. | https://github.com/lukwagoasuman/CVE-2021-3129---Laravel-RCE | POC详情 |
| 34 | Laravel Debug Mode and Payload | https://github.com/piperpwn/CVE-2021-3129-piperpwn | POC详情 |
| 35 | Laravel version 8.4.2 and before with Ignition before 2.5.2 allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-3129.yaml | POC详情 |
| 36 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Laravel%20%E5%B0%8F%E4%BA%8E%208.4.2%20Debug%E6%A8%A1%E5%BC%8F%20_ignition%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-3129.md | POC详情 |
| 37 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Laravel%20Ignition%202.5.1%20%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-3129.md | POC详情 |
| 38 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/laravel-cve-2021-3129.yml | POC详情 |
| 39 | https://github.com/vulhub/vulhub/blob/master/laravel/CVE-2021-3129/README.md | POC详情 |
标题: Packet Storm -- 🔗来源链接
标签:x_refsource_MISC
神龙速读:
### 关键信息摘要
#### 漏洞信息来源
- **Packet Storm Security** - 提供安全漏洞信息和相关安全资源。
#### 漏洞相关条款
- **Prohibited Activities**
- 禁止对站点或其用户进行任何恶意行为。
- 禁止以任何恶意方式使用从站点检索到的数据。
- 禁止违反本节中规定的任何禁令。
- **User Registration**
- 用户可能需要注册。创建账户是免费的;但是,如果滥用,公司保留决定是否禁用账户及滥用行为的定义的全部决策权。
- **Contributions**
- 通过将您的贡献发布到站点的任何部分,您自动授予我们无限制、无限制、不可撤销、永久性、非排他性、可转让、免版税、全额预付、全球范围内使用、复制、披露、出售、转售、发布、广播、重新编辑、存档、存储、缓存、公开表演、公开展示、重新格式化、翻译、传输或摘录的权利(无论是全部还是部分)并分发此类贡献出于任何目的、商业、广告或以其他方式。
#### 其他关键点
- **API Access**: 用户可以访问API,需遵守特定的许可和使用条款。
- **Advertising Services**: 广告服务按特定条款提供。
- **Privacy Policy**: 用户数据的安全和隐私保护。
- **Limitations of Liability**: 公司对任何直接、间接、附带、特殊或惩罚性损害概不负责。
暂无评论