CVE-2024-52301 – Laravel allows environment manipulation via query string
https://notcve.org/view.php?id=CVE-2024-52301
Laravel is a web application framework. When the register_argc_argv php directive is set to on , and users call any URL with a special crafted query string, they are able to change the environment used by the framework when handling the request. The vulnerability fixed in 6.20.45, 7.30.7, 8.83.28, 9.52.17, 10.48.23, and 11.31.0. The framework now ignores argv values for environment detection on non-cli SAPIs. • https://github.com/laravel/framework/security/advisories/GHSA-gv7v-rgg6-548h • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •
CVE-2022-40482
https://notcve.org/view.php?id=CVE-2022-40482
The authentication method in Laravel 8.x through 9.x before 9.32.0 was discovered to be vulnerable to user enumeration via timeless timing attacks with HTTP/2 multiplexing. This is caused by the early return inside the hasValidCredentials method in the Illuminate\Auth\SessionGuard class when a user is found to not exist. • https://ephort.dk/blog/laravel-timing-attack-vulnerability https://github.com/ephort/laravel-user-enumeration-demo https://github.com/laravel/framework/pull/44069 https://github.com/laravel/framework/releases/tag/v9.32.0 • CWE-203: Observable Discrepancy •