Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-3129 PoC — Facade Ignition for Laravel 授权问题漏洞

Source
Associated Vulnerability
Title:Facade Ignition for Laravel 授权问题漏洞 (CVE-2021-3129)
Description:Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
Description
Laravel RCE (CVE-2021-3129)
Readme
# CVE-2021-3129
Laravel RCE (CVE-2021-3129)

# Test Environment
```
mkdir CVE-2021-3129-docker
cd CVE-2021-3129-docker
wget https://raw.githubusercontent.com/vulhub/vulhub/master/laravel/CVE-2021-3129/docker-compose.yml
docker compose up -d
```
# Usage
```
git clone https://github.com/miko550/CVE-2021-3129.git
cd CVE-2021-3129
pip install -r requirements.txt
python3 CVE-2021-3129.py -t "http://127.0.0.1:8080/" -c "whoami"
```

# Reference
https://github.com/joshuavanderpoll/CVE-2021-3129
File Snapshot

[4.0K] /data/pocs/0dabc1814a4de44cd3303f7b56e69a01f272f74a ├── [4.9K] CVE-2021-3129.py ├── [ 86] docker-compose.yml └── [ 493] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →