目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2021-3129 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Facade Ignition for Laravel 授权问题漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Facade Ignition for Laravel是比利时Facade公司的一款运行在Laravel Web框架中的可自定义的错误页面。 Ignition for Laravel 2.5.2之前版本存在授权问题漏洞,该漏洞源于程序未进行正确的身份验证,攻击者可利用该漏洞执行任意代码。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
-n/a n/a -
二、漏洞 CVE-2021-3129 的公开POC
#POC 描述源链接神龙链接
1Exploit for CVE-2021-3129https://github.com/ambionics/laravel-exploitsPOC详情
2Laravel debug rcehttps://github.com/SNCKER/CVE-2021-3129POC详情
3Nonehttps://github.com/SecPros-Team/laravel-CVE-2021-3129-EXPPOC详情
4Nonehttps://github.com/crisprss/Laravel_CVE-2021-3129_EXPPOC详情
5Exploit for CVE-2021-3129https://github.com/nth347/CVE-2021-3129_exploitPOC详情
6Nonehttps://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129POC详情
7Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)https://github.com/zhzyker/CVE-2021-3129POC详情
8CVE-2021-3129-Laravel Debug mode 远程代码执行漏洞https://github.com/simonlee-hello/CVE-2021-3129POC详情
9Nonehttps://github.com/idea-oss/laravel-CVE-2021-3129-EXPPOC详情
10PoC for CVE-2021-3129 (Laravel)https://github.com/knqyf263/CVE-2021-3129POC详情
11Add revert shell https://github.com/cuongtop4598/CVE-2021-3129-ScriptPOC详情
12Laravel RCE (CVE-2021-3129)https://github.com/joshuavanderpoll/CVE-2021-3129POC详情
13CVE-2021-3129 POChttps://github.com/shadowabi/Laravel-CVE-2021-3129POC详情
14Unauthenticated RCE in Laravel Debug Mode <8.4.2https://github.com/JacobEbben/CVE-2021-3129POC详情
15Laravel debug mode - Remote Code Execution (RCE)https://github.com/hupe1980/CVE-2021-3129POC详情
16CVE-2021-3129-Laravel Debug modehttps://github.com/0nion1/CVE-2021-3129POC详情
17CVE-2021-3129 Exploit Checker By ./MrMadhttps://github.com/MadExploits/Laravel-debug-CheckerPOC详情
18Laravel Debug mode RCE漏洞(CVE-2021-3129)poc / exphttps://github.com/ajisai-babu/CVE-2021-3129-expPOC详情
19Laravel RCE CVE-2021-3129https://github.com/keyuan15/CVE-2021-3129POC详情
20Nonehttps://github.com/qaisarafridi/cve-2021-3129POC详情
21Nonehttps://github.com/Zoo1sondv/CVE-2021-3129POC详情
22Laravel RCE (CVE-2021-3129)https://github.com/miko550/CVE-2021-3129POC详情
23CVE-2021-3129 | Laravel Debug Mode Vulnerabilityhttps://github.com/withmasday/CVE-2021-3129POC详情
24Nonehttps://github.com/banyaksepuh/Mass-CVE-2021-3129-ScannerPOC详情
25Nonehttps://github.com/Axianke/CVE-2021-3129POC详情
26A exploit script for CVE-2021-3129https://github.com/cc3305/CVE-2021-3129POC详情
27CVE-2021-3129 | Laravel Debug Mode Vulnerabilityhttps://github.com/wmasday/CVE-2021-3129POC详情
28Laravel Debug Mode and Payloadhttps://github.com/piperpwn/CVE-2021-3129-POC详情
29CVE-2021-3129-Laravel Debug mode 远程代码执行漏洞https://github.com/Y0s9/CVE-2021-3129POC详情
30CVE-2021-3129 Laravel Ignition RCE Exploithttps://github.com/0x0d3ad/CVE-2021-3129POC详情
31Nonehttps://github.com/GodOfServer/CVE-2021-3129POC详情
32Modified version of laravel ignition RCE (CVE-2021-3129) exploit script for Hour of Hack Session-4https://github.com/Prabesh01/hoh4POC详情
33## About The script has been made for exploiting the Laravel RCE (CVE-2021-3129) vulnerability.<br> This script allows you to write/execute commands on a website running <b>Laravel <= v8.4.2</b>, that has "APP_DEBUG" set to "true" in its ".env" file.https://github.com/lukwagoasuman/CVE-2021-3129---Laravel-RCEPOC详情
34Laravel Debug Mode and Payloadhttps://github.com/piperpwn/CVE-2021-3129-piperpwnPOC详情
35Laravel version 8.4.2 and before with Ignition before 2.5.2 allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-3129.yamlPOC详情
36Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Laravel%20%E5%B0%8F%E4%BA%8E%208.4.2%20Debug%E6%A8%A1%E5%BC%8F%20_ignition%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-3129.mdPOC详情
37Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Laravel%20Ignition%202.5.1%20%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-3129.mdPOC详情
38Nonehttps://github.com/chaitin/xray-plugins/blob/main/poc/manual/laravel-cve-2021-3129.ymlPOC详情
39https://github.com/vulhub/vulhub/blob/master/laravel/CVE-2021-3129/README.mdPOC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2021-3129 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-3129

暂无评论


发表评论