cve/2018/CVE-2018-15133.md
2024-06-09 00:33:16 +00:00

50 lines
2.7 KiB
Markdown

### [CVE-2018-15133](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15133)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack.
### POC
#### Reference
- http://packetstormsecurity.com/files/153641/PHP-Laravel-Framework-Token-Unserialize-Remote-Command-Execution.html
- http://packetstormsecurity.com/files/153641/PHP-Laravel-Framework-Token-Unserialize-Remote-Command-Execution.html
#### Github
- https://github.com/0xSalle/cve-2018-15133
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AlienX2001/better-poc-for-CVE-2018-15133
- https://github.com/AzhariKun/CVE-2018-15133
- https://github.com/Bilelxdz/Laravel-CVE-2018-15133
- https://github.com/Cr4zyD14m0nd137/Lab-for-cve-2018-15133
- https://github.com/H0j3n/EzpzCheatSheet
- https://github.com/NatteeSetobol/CVE-2018-15133-Lavel-Expliot
- https://github.com/Ostorlab/KEV
- https://github.com/PonusJang/RCE_COLLECT
- https://github.com/Prabesh01/Laravel-PHP-Unit-RCE-Auto-shell-uploader
- https://github.com/PwnedShell/Larascript
- https://github.com/SexyBeast233/SecBooks
- https://github.com/aljavier/exploit_laravel_cve-2018-15133
- https://github.com/bukitbarisan/laravel-rce-cve-2018-15133
- https://github.com/carlosevieira/larasploit
- https://github.com/crowsec-edtech/larasploit
- https://github.com/d3lt4-024/Web-CTF-CheatSheet-And-Learning
- https://github.com/enlightn/security-checker
- https://github.com/h0n3yb/poc-development
- https://github.com/huydoppa/CVE-2018-15133
- https://github.com/iskww/larasploit
- https://github.com/karimmuya/laravel-exploit-tricks
- https://github.com/kozmic/laravel-poc-CVE-2018-15133
- https://github.com/lucafa/CTF
- https://github.com/owen800q/Awesome-Stars
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/pwnedshell/Larascript
- https://github.com/u1f383/Web-CTF-CheatSheet-And-Learning