一、 漏洞 CVE-2021-3129 基础信息
漏洞标题
N/A
来源:AIGC 神龙大模型
漏洞描述信息
在 Laravel 和其他产品中使用 2.5.2 之前开启,由于不安全地使用 file_get_contents() 和 file_put_contents(),允许无授权的远程攻击者执行任意代码。在 Laravel 8.4.2 之前使用调试模式的网站可以被利用。
来源:AIGC 神龙大模型
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
来源:AIGC 神龙大模型
漏洞类别
N/A
来源:AIGC 神龙大模型
漏洞标题
N/A
来源:美国国家漏洞数据库 NVD
漏洞描述信息
Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
N/A
来源:美国国家漏洞数据库 NVD
漏洞标题
Facade Ignition for Laravel 授权问题漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Facade Ignition for Laravel是比利时Facade公司的一款运行在Laravel Web框架中的可自定义的错误页面。 Ignition for Laravel 2.5.2之前版本存在授权问题漏洞,该漏洞源于程序未进行正确的身份验证,攻击者可利用该漏洞执行任意代码。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
授权问题
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2021-3129 的公开POC
# POC 描述 源链接 神龙链接
1 Exploit for CVE-2021-3129 https://github.com/ambionics/laravel-exploits POC详情
2 Laravel debug rce https://github.com/SNCKER/CVE-2021-3129 POC详情
3 None https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP POC详情
4 None https://github.com/crisprss/Laravel_CVE-2021-3129_EXP POC详情
5 Exploit for CVE-2021-3129 https://github.com/nth347/CVE-2021-3129_exploit POC详情
6 None https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129 POC详情
7 Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129) https://github.com/zhzyker/CVE-2021-3129 POC详情
8 CVE-2021-3129-Laravel Debug mode 远程代码执行漏洞 https://github.com/simonlee-hello/CVE-2021-3129 POC详情
9 None https://github.com/idea-oss/laravel-CVE-2021-3129-EXP POC详情
10 PoC for CVE-2021-3129 (Laravel) https://github.com/knqyf263/CVE-2021-3129 POC详情
11 Add revert shell https://github.com/cuongtop4598/CVE-2021-3129-Script POC详情
12 Laravel RCE (CVE-2021-3129) https://github.com/joshuavanderpoll/CVE-2021-3129 POC详情
13 CVE-2021-3129 POC https://github.com/shadowabi/Laravel-CVE-2021-3129 POC详情
14 Unauthenticated RCE in Laravel Debug Mode <8.4.2 https://github.com/JacobEbben/CVE-2021-3129 POC详情
15 Laravel debug mode - Remote Code Execution (RCE) https://github.com/hupe1980/CVE-2021-3129 POC详情
16 CVE-2021-3129-Laravel Debug mode https://github.com/0nion1/CVE-2021-3129 POC详情
17 CVE-2021-3129 Exploit Checker By ./MrMad https://github.com/MadExploits/Laravel-debug-Checker POC详情
18 Laravel Debug mode RCE漏洞(CVE-2021-3129)poc / exp https://github.com/ajisai-babu/CVE-2021-3129-exp POC详情
19 Laravel RCE CVE-2021-3129 https://github.com/keyuan15/CVE-2021-3129 POC详情
20 None https://github.com/qaisarafridi/cve-2021-3129 POC详情
21 None https://github.com/Zoo1sondv/CVE-2021-3129 POC详情
22 Laravel RCE (CVE-2021-3129) https://github.com/miko550/CVE-2021-3129 POC详情
23 CVE-2021-3129 | Laravel Debug Mode Vulnerability https://github.com/withmasday/CVE-2021-3129 POC详情
24 None https://github.com/banyaksepuh/Mass-CVE-2021-3129-Scanner POC详情
25 None https://github.com/Axianke/CVE-2021-3129 POC详情
26 A exploit script for CVE-2021-3129 https://github.com/cc3305/CVE-2021-3129 POC详情
27 CVE-2021-3129 | Laravel Debug Mode Vulnerability https://github.com/wmasday/CVE-2021-3129 POC详情
28 Laravel Debug Mode and Payload https://github.com/piperpwn/CVE-2021-3129- POC详情
29 CVE-2021-3129-Laravel Debug mode 远程代码执行漏洞 https://github.com/Y0s9/CVE-2021-3129 POC详情
30 CVE-2021-3129 Laravel Ignition RCE Exploit https://github.com/0x0d3ad/CVE-2021-3129 POC详情
31 None https://github.com/GodOfServer/CVE-2021-3129 POC详情
32 Modified version of laravel ignition RCE (CVE-2021-3129) exploit script for Hour of Hack Session-4 https://github.com/Prabesh01/hoh4 POC详情
33 ## About The script has been made for exploiting the Laravel RCE (CVE-2021-3129) vulnerability.<br> This script allows you to write/execute commands on a website running <b>Laravel <= v8.4.2</b>, that has "APP_DEBUG" set to "true" in its ".env" file. https://github.com/lukwagoasuman/CVE-2021-3129---Laravel-RCE POC详情
34 Laravel Debug Mode and Payload https://github.com/piperpwn/CVE-2021-3129-piperpwn POC详情
35 Laravel version 8.4.2 and before with Ignition before 2.5.2 allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-3129.yaml POC详情
36 None https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Laravel%20%E5%B0%8F%E4%BA%8E%208.4.2%20Debug%E6%A8%A1%E5%BC%8F%20_ignition%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-3129.md POC详情
37 None https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Laravel%20Ignition%202.5.1%20%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-3129.md POC详情
38 None https://github.com/chaitin/xray-plugins/blob/main/poc/manual/laravel-cve-2021-3129.yml POC详情
39 https://github.com/vulhub/vulhub/blob/master/laravel/CVE-2021-3129/README.md POC详情
三、漏洞 CVE-2021-3129 的情报信息