Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-3129 PoC — Facade Ignition for Laravel 授权问题漏洞

Source
Associated Vulnerability
Title:Facade Ignition for Laravel 授权问题漏洞 (CVE-2021-3129)
Description:Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
Description
PoC for CVE-2021-3129 (Laravel)
Readme
# CVE-2021-3129
PoC for CVE-2021-3129 (Laravel)

For educational purposes only


## Test

### Set up the PoC environment

```
$ docker-compose build
$ docker-compose up -d
```

### Confirm it works

See http://localhost:8000/ and make sure the Laravel default page is shown.

### Exploit

```
$ docker-compose exec attacker sh
/ # python3 exploit.py
```

## References
- https://www.ambionics.io/blog/laravel-debug-rce
- https://github.com/SNCKER/CVE-2021-3129

## Author
Teppei Fukuda
File Snapshot

[4.0K] /data/pocs/94db171b67b1817dcc0b03229d7f4afe4e0f311d ├── [4.0K] attacker │   ├── [ 223] Dockerfile │   └── [3.9K] exploit.py ├── [ 120] docker-compose.yml ├── [ 11K] LICENSE ├── [ 486] README.md └── [4.0K] victim └── [ 547] Dockerfile 2 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →