24 results (0.004 seconds)

CVSS: 6.3EPSS: 0%CPEs: 1EXPL: 0

Laravel Reverb provides a real-time WebSocket communication backend for Laravel applications. Prior to 1.4.0, there is an issue where verification signatures for requests sent to Reverb's Pusher-compatible API were not being verified. This API is used in scenarios such as broadcasting a message from a backend service or for obtaining statistical information (such as number of connections) about a given channel. This issue only affects the Pusher-compatible API endpoints and not the WebSocket connections themselves. In order to exploit this vulnerability, the application ID which, should never be exposed, would need to be known by an attacker. • https://github.com/laravel/reverb/commit/73cc140d76e803b151fc2dd2e4eb3eb784a82ee2 https://github.com/laravel/reverb/pull/252 https://github.com/laravel/reverb/releases/tag/v1.4.0 https://github.com/laravel/reverb/security/advisories/GHSA-pfrr-xvrf-pxjx • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Cross-Site Request Forgery (CSRF) vulnerability in livewire before v3.0.4, allows remote attackers to execute arbitrary code getCsrfToken function. NOTE: the vendor disputes this because the 5d88731 commit fixes a usability problem (HTTP 419 status codes for legitimate client activity), not a security problem. Vulnerabilidad de Cross-Site Request Forgery (CSRF) en livewire anterior a v3.0.4, permite a atacantes remotos ejecutar código arbitrario en la función getCsrfToken. • https://github.com/github/advisory-database/pull/3490 https://github.com/livewire/livewire/commit/5d887316f2aaf83c0e380ac5e72766f19700fa3b • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 2

The authentication method in Laravel 8.x through 9.x before 9.32.0 was discovered to be vulnerable to user enumeration via timeless timing attacks with HTTP/2 multiplexing. This is caused by the early return inside the hasValidCredentials method in the Illuminate\Auth\SessionGuard class when a user is found to not exist. • https://ephort.dk/blog/laravel-timing-attack-vulnerability https://github.com/ephort/laravel-user-enumeration-demo https://github.com/laravel/framework/pull/44069 https://github.com/laravel/framework/releases/tag/v9.32.0 • CWE-203: Observable Discrepancy •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A deserialization vulnerability in the destruct() function of Laravel v8.5.9 allows attackers to execute arbitrary commands. • https://s1mple-top.github.io/2021/03/09/Laravel8-new-pop-chain-mining-process • CWE-502: Deserialization of Untrusted Data •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

An arbitrary file upload vulnerability in laravel-admin v1.8.19 allows attackers to execute arbitrary code via a crafted PHP file. • https://github.com/IDUZZEL/CVE-2023-24249-Exploit https://flyd.uk/post/cve-2023-24249 https://github.com/z-song/laravel-admin https://laravel-admin.org • CWE-434: Unrestricted Upload of File with Dangerous Type •