mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-06 02:31:35 +00:00
2.0 KiB
2.0 KiB
ThinkPHP Debug Mode Log Information Disclosure Vulnerability
Vulnerability | ThinkPHP Debug Mode Log Information Disclosure Vulnerability |
---|---|
Chinese name | ThinkPHP Debug 模式日志信息泄露漏洞 |
CVSS core | 5.0 |
FOFA Query (click to view the results directly) | (((header="thinkphp" || header="think_template") && header!="couchdb" && header!="St: upnp:rootdevice") || body="href=\"http://www.thinkphp.cn\">ThinkPHP</a ><sup>" || ((banner="thinkphp" || banner="think_template") && banner!="couchdb" && banner!="St: upnp:rootdevice") || (body="ThinkPHP" && body="internal function")) |
Number of assets affected | 680923 |
Description | env configuration leakage: Attacker can fetch env configuration file in laravel framework 5.5.21 and earlier. CVE-2018-15133: In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack. When exploit CVE-2018-15133, you need to input a url path that support POST method. |
Impact | Laravel env configuration leakage |