Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-52301— Laravel allows environment manipulation via query string

EPSS 65.71% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-52301

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Laravel allows environment manipulation via query string
Source: NVD (National Vulnerability Database)
Vulnerability Description
Laravel is a web application framework. When the register_argc_argv php directive is set to on , and users call any URL with a special crafted query string, they are able to change the environment used by the framework when handling the request. The vulnerability fixed in 6.20.45, 7.30.7, 8.83.28, 9.52.17, 10.48.23, and 11.31.0. The framework now ignores argv values for environment detection on non-cli SAPIs.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
参数注入或修改
Source: NVD (National Vulnerability Database)
Vulnerability Title
Laravel 参数注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Laravel是Laravel社区的一个Web 应用程序框架。 Laravel存在参数注入漏洞。攻击者利用该漏洞可以使用特制的查询字符串调用任何URL。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
laravelframework < 6.20.45 -

II. Public POCs for CVE-2024-52301

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/Nyamort/CVE-2024-52301POC Details
2A bit of research around CVE-2024-52301https://github.com/martinhaunschmid/CVE-2024-52301-ResearchPOC Details
3Arbitrary Argument Injection Scanner CVE-2024-52301https://github.com/nanwinata/CVE-2024-52301POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-52301

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-52301

No comments yet


Leave a comment