关联漏洞
描述
A exploit script for CVE-2021-3129
介绍
# CVE-2021-3129
> Unauthenticated RCE in Laravel Ignition via File Upload
## Summary of the CVE
In affected versions of Laravel Ignition a attack can execute arbitrary code because of the insecure usage of `file_get_contents()` and `file_put_contents()`.
This is only exploitable for websites that use debug mode.
## Affected Versions
- Laravel Ignition < 2.5.2 and Laravel < 8.4.2
## Anomalies
- This exploit needs a php gadget and is therefore using phpggc. You can do this the following ways:
- If you haven't already cloned: `git clone https://github.com/cc3305/CVE-2021-3129.git --recursive --shallow-submodules`.
- Or if you have already cloned in, run this in the local git repo `git submodule update --init --depth 1`.
## References
- [Original Report - Charles Fol, Jan 12 2021](https://www.ambionics.io/blog/laravel-debug-rce)
- [First Github POC - SNCKER, Jan 24 2021](https://github.com/SNCKER/CVE-2021-3129)
- [Github POC - joshuavanderpoll, Aug 16 2023](https://github.com/joshuavanderpoll/CVE-2021-3129)
- [CVE-details - CVSS Score 7.5](https://www.cvedetails.com/cve/CVE-2021-3129/)
文件快照
[4.0K] /data/pocs/22523ca320b4679e60d808c7226106c0678b3149
├── [ 13K] CVE-2021-3129.py
├── [4.0K] phpggc
└── [1.1K] README.md
1 directory, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。