// For flags

CVE-2021-21263

Query Binding Exploitation in Laravel

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Laravel is a web application framework. Versions of Laravel before 6.20.11, 7.30.2 and 8.22.1 contain a query binding exploitation. This same exploit applies to the illuminate/database package which is used by Laravel. If a request is crafted where a field that is normally a non-array value is an array, and that input is not validated or cast to its expected type before being passed to the query builder, an unexpected number of query bindings can be added to the query. In some situations, this will simply lead to no results being returned by the query builder; however, it is possible certain queries could be affected in a way that causes the query to return unexpected results.

Laravel es un framework de aplicación web. Las versiones de Laravel anteriores a 6.20.11, 7.30.2 y 8.22.1 contienen una explotación de enlace de consultas. Esta misma explotación se aplica al paquete illuminate/database que usa Laravel. Si una petición es diseñada donde un campo que normalmente es un valor que no es una matriz es una matriz, y esa entrada no es comprobada ni se convierte al tipo esperado antes de pasarla al generador de consultas, una cantidad inesperada de enlaces de consulta pueden ser agregadas a la consulta. En algunas situaciones, esto simplemente conllevará a que el generador de consultas no devuelva resultados; sin embargo, es posible que determinadas consultas estén afectadas de forma que cause que la consulta devuelva resultados inesperados

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-12-22 CVE Reserved
  • 2021-01-19 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-11-23 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Laravel
Search vendor "Laravel"
Laravel
Search vendor "Laravel" for product "Laravel"
>= 6.0.0 < 6.20.11
Search vendor "Laravel" for product "Laravel" and version " >= 6.0.0 < 6.20.11"
-
Affected
Laravel
Search vendor "Laravel"
Laravel
Search vendor "Laravel" for product "Laravel"
>= 7.0.0 < 7.30.2
Search vendor "Laravel" for product "Laravel" and version " >= 7.0.0 < 7.30.2"
-
Affected
Laravel
Search vendor "Laravel"
Laravel
Search vendor "Laravel" for product "Laravel"
>= 8.0.0 < 8.22.1
Search vendor "Laravel" for product "Laravel" and version " >= 8.0.0 < 8.22.1"
-
Affected