icon

We found results for “

CVE-2021-3129

Good to know:

icon

Date: January 12, 2021

Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.

Language: PHP

Severity Score

Severity Score

Weakness Type (CWE)

Improper Control of Generation of Code ('Code Injection')

CWE-94

Insufficient Information

NVD-CWE-noinfo

Top Fix

icon

Upgrade Version

Upgrade to version facade/ignition - 2.5.2;facade/ignition - 2.4.x-dev;facade/ignition - dev-feature/livewire-support;facade/ignition - 2.4.2;facade/ignition - 1.16.14;houdunwang/hdcms - v1.0.10;houdunwang/hdcms - no_fix;houdunwang/hdcms - v5.7.1;houdunwang/hdcms - dev-dependabot/npm_and_yarn/ini-1.3.7;houdunwang/hdcms - dev-dependabot/npm_and_yarn/mixin-deep-1.3.2;houdunwang/hdcms - dev-dependabot/composer/laravel/framework-6.20.12;houdunwang/hdcms - dev-dependabot/composer/guzzlehttp/psr7-2.5.0;houdunwang/hdcms - dev-dependabot/npm_and_yarn/js-yaml-3.13.1;hamedsz/instagram-private-api - v1.8;hamedsz/instagram-private-api - v1.0;codicastudio/feedback - 1.0.0;meshesha/visual-form-maker - no_fix;meshesha/visual-form-maker - v0.0.1-alpha;aibnuhibban/larawire - dev-dependabot/npm_and_yarn/axios-0.21.1;aibnuhibban/larawire - no_fix;blitz-mobile-apps/laravel-graphql-passport-auth-fileupload - no_fix;globalsprojects/nova-invoice-adjustment - dev-dependabot/npm_and_yarn/ini-1.3.7;alonso/miratio - no_fix;o2one/hesabe_payment - no_fix

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): LOW
Authentication (AU): NONE
Confidentiality (C): PARTIAL
Integrity (I): PARTIAL
Availability (A): PARTIAL
Additional information:

Do you need more information?

Contact Us