CVE-2021-21263
Query Binding Exploitation in Laravel
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Laravel is a web application framework. Versions of Laravel before 6.20.11, 7.30.2 and 8.22.1 contain a query binding exploitation. This same exploit applies to the illuminate/database package which is used by Laravel. If a request is crafted where a field that is normally a non-array value is an array, and that input is not validated or cast to its expected type before being passed to the query builder, an unexpected number of query bindings can be added to the query. In some situations, this will simply lead to no results being returned by the query builder; however, it is possible certain queries could be affected in a way that causes the query to return unexpected results.
Laravel es un framework de aplicación web. Las versiones de Laravel anteriores a 6.20.11, 7.30.2 y 8.22.1 contienen una explotación de enlace de consultas. Esta misma explotación se aplica al paquete illuminate/database que usa Laravel. Si una petición es diseñada donde un campo que normalmente es un valor que no es una matriz es una matriz, y esa entrada no es comprobada ni se convierte al tipo esperado antes de pasarla al generador de consultas, una cantidad inesperada de enlaces de consulta pueden ser agregadas a la consulta. En algunas situaciones, esto simplemente conllevará a que el generador de consultas no devuelva resultados; sin embargo, es posible que determinadas consultas estén afectadas de forma que cause que la consulta devuelva resultados inesperados
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-12-22 CVE Reserved
- 2021-01-19 CVE Published
- 2024-08-03 CVE Updated
- 2024-11-23 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://github.com/laravel/framework/security/advisories/GHSA-3p32-j457-pg5x | Third Party Advisory | |
https://packagist.org/packages/illuminate/database | Product | |
https://packagist.org/packages/laravel/framework | Product |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/laravel/framework/pull/35865 | 2022-10-19 |
URL | Date | SRC |
---|---|---|
https://blog.laravel.com/security-laravel-62011-7302-8221-released | 2022-10-19 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Laravel Search vendor "Laravel" | Laravel Search vendor "Laravel" for product "Laravel" | >= 6.0.0 < 6.20.11 Search vendor "Laravel" for product "Laravel" and version " >= 6.0.0 < 6.20.11" | - |
Affected
| ||||||
Laravel Search vendor "Laravel" | Laravel Search vendor "Laravel" for product "Laravel" | >= 7.0.0 < 7.30.2 Search vendor "Laravel" for product "Laravel" and version " >= 7.0.0 < 7.30.2" | - |
Affected
| ||||||
Laravel Search vendor "Laravel" | Laravel Search vendor "Laravel" for product "Laravel" | >= 8.0.0 < 8.22.1 Search vendor "Laravel" for product "Laravel" and version " >= 8.0.0 < 8.22.1" | - |
Affected
|