漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Livewire Remote Code Execution (RCE) on File Uploads
Vulnerability Description
Livewire is a full-stack framework for Laravel that allows for dynamic UI components without leaving PHP. In livewire/livewire prior to `2.12.7` and `v3.5.2`, the file extension of an uploaded file is guessed based on the MIME type. As a result, the actual file extension from the file name is not validated. An attacker can therefore bypass the validation by uploading a file with a valid MIME type (e.g., `image/png`) and a “.php” file extension. If the following criteria are met, the attacker can carry out an RCE attack: 1. Filename is composed of the original file name using `$file->getClientOriginalName()`. 2. Files stored directly on your server in a public storage disk. 3. Webserver is configured to execute “.php” files. This issue has been addressed in release versions `2.12.7` and `3.5.2`. All users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS Information
N/A
Vulnerability Type
输入验证不恰当
Vulnerability Title
Livewire 输入验证错误漏洞
Vulnerability Description
Livewire是Livewire开源的一个 Laravel 的全栈框架,允许您在不离开 PHP 的情况下构建动态 UI 组件。 Livewire v3.5.2版本之前存在输入验证错误漏洞,该漏洞源于文件名的实际文件扩展名未经验证。
CVSS Information
N/A
Vulnerability Type
N/A