A significant security flaw, CVE-2024-52301, has been found in the Laravel framework, which is widely used for web applications. With a CVSS rating of 8.7, this vulnerability could allow unauthorized access, data tampering, and privilege escalation in many Laravel applications.
CVE-2024-52301 pertains to inadequate input validation in Laravel’s environment configuration. The problem arises from how Laravel manages PHP’s register_argc_argv directive, which allows command-line arguments in scripts. If this directive is enabled, attackers could exploit it with malicious URLs to modify environment variables used by Laravel during request processing.
By infosecbulletin
/ Friday , November 15 2024
US authorities have revealed a major cyberespionage campaign by hackers, targeting information from Americans in government and politics. The FBI...
Read More
By infosecbulletin
/ Friday , November 15 2024
A significant security flaw, CVE-2024-52301, has been found in the Laravel framework, which is widely used for web applications. With...
Read More
By infosecbulletin
/ Thursday , November 14 2024
Bitdefender has released a decryptor for the ShrinkLocker ransomware after months of concern from responders regarding attacks involving this malware....
Read More
By infosecbulletin
/ Wednesday , November 13 2024
Fortinet has issued security updates for several products, including FortiOS, to fix vulnerabilities that could allow cyber attackers to take...
Read More
By infosecbulletin
/ Wednesday , November 13 2024
Microsoft's latest Patch Tuesday update fixes 89 security vulnerabilities. Four of these are zero-day vulnerabilities, with two currently being exploited....
Read More
By infosecbulletin
/ Monday , November 11 2024
On November 7, 2024, CISA released advisories about 3 critical security issues, vulnerabilities, and exploits related to Industrial Control Systems...
Read More
By infosecbulletin
/ Monday , November 11 2024
A cyberattack on an Israeli clearing company on Sunday left some people unable to use their credit cards for shopping...
Read More
By infosecbulletin
/ Monday , November 11 2024
Russia's media censor, Roskomnadzor, has blocked thousands of local websites using Cloudflare's encryption feature that enhances online privacy and security....
Read More
By infosecbulletin
/ Sunday , November 10 2024
Advertisement for selling the credentials of allegedly belonging to Indian government emails surfaced on the dark web marketplace. A hacker...
Read More
By infosecbulletin
/ Saturday , November 9 2024
Bangladesh faced a 105% rise in cyber incidents from the second to the third quarter of 2024, making it one...
Read More
Improper validation allows attackers to bypass input checks or inject harmful data. With register_argc_argv enabled, Laravel applications are at higher risk, as attackers can exploit PHP’s default behavior to gain unauthorized control over the application.
Laravel is popular for web applications and APIs, making its vulnerability a significant concern due to its widespread use. This flaw impacts several versions of Laravel, including:
Versions < 6.20.45
Versions >= 7.0.0 and < 7.30.7
Versions >= 8.0.0 and < 8.83.28
Versions >= 9.0.0 and < 9.52.17
Versions >= 10.0.0 and < 10.48.23
Versions >= 11.0.0 and < 11.31.0
Organizations using these Laravel versions for public applications may be vulnerable to attacks that could lead to unauthorized access and data breaches.
In response to CVE-2024-52301, Laravel has issued patches across affected versions, with the updated versions being:
6.20.45
7.30.7
8.83.28
9.52.17
10.48.23
11.31.0
The latest Laravel patch prevents environment detection using argv values on non-CLI interfaces, closing a security vulnerability. Developers should upgrade to the updated versions immediately.