cve/2024/CVE-2024-47823.md
2025-09-29 16:08:36 +00:00

18 lines
1.5 KiB
Markdown

### [CVE-2024-47823](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47823)
![](https://img.shields.io/static/v1?label=Product&message=livewire&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%203.0.0-beta.1%2C%20%3C%203.5.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%3A%20Improper%20Input%20Validation&color=brighgreen)
### Description
Livewire is a full-stack framework for Laravel that allows for dynamic UI components without leaving PHP. In livewire/livewire prior to `2.12.7` and `v3.5.2`, the file extension of an uploaded file is guessed based on the MIME type. As a result, the actual file extension from the file name is not validated. An attacker can therefore bypass the validation by uploading a file with a valid MIME type (e.g., `image/png`) and a “.php” file extension. If the following criteria are met, the attacker can carry out an RCE attack: 1. Filename is composed of the original file name using `$file->getClientOriginalName()`. 2. Files stored directly on your server in a public storage disk. 3. Webserver is configured to execute “.php” files. This issue has been addressed in release versions `2.12.7` and `3.5.2`. All users are advised to upgrade. There are no known workarounds for this vulnerability.
### POC
#### Reference
- https://github.com/livewire/livewire/security/advisories/GHSA-f3cx-396f-7jqp
#### Github
No PoCs found on GitHub currently.