GHSA-F3CX-396F-7JQP
Vulnerability from github – Published: 2024-10-08 22:19 – Updated: 2024-10-09 23:52
VLAI?
Summary
Livewire Remote Code Execution on File Uploads
Details
In livewire/livewire prior to v2.12.7 and v3.5.2, the file extension of an uploaded file is guessed based on the MIME type. As a result, the actual file extension from the file name is not validated. An attacker can therefore bypass the validation by uploading a file with a valid MIME type (e.g., image/png) and a “.php” file extension.
If the following criteria are met, the attacker can carry out an RCE attack:
- Filename is composed of the original file name using
$file->getClientOriginalName() - Files stored directly on your server in a public storage disk
- Webserver is configured to execute “.php” files
PoC
In the following scenario, an attacker could upload a file called shell.php with an image/png MIME type and execute it on the remote server.
class SomeComponent extends Component
{
use WithFileUploads;
#[Validate('image|extensions:png')]
public $file;
public function save()
{
$this->validate();
$this->file->storeAs(
path: 'images',
name: $this->file->getClientOriginalName(),
options: ['disk' => 'public'],
);
}
}
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "Packagist",
"name": "livewire/livewire"
},
"ranges": [
{
"events": [
{
"introduced": "3.0.0-beta.1"
},
{
"fixed": "3.5.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Packagist",
"name": "livewire/livewire"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.12.7"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-47823"
],
"database_specific": {
"cwe_ids": [
"CWE-20",
"CWE-434"
],
"github_reviewed": true,
"github_reviewed_at": "2024-10-08T22:19:16Z",
"nvd_published_at": "2024-10-08T18:15:31Z",
"severity": "HIGH"
},
"details": "In livewire/livewire prior to `v2.12.7` and `v3.5.2`, the file extension of an uploaded file is guessed based on the MIME type. As a result, the actual file extension from the file name is not validated. An attacker can therefore bypass the validation by uploading a file with a valid MIME type (e.g., `image/png`) and a \u201c.php\u201d file extension.\nIf the following criteria are met, the attacker can carry out an RCE attack:\n\n- Filename is composed of the original file name using `$file-\u003egetClientOriginalName()`\n- Files stored directly on your server in a public storage disk\n- Webserver is configured to execute \u201c.php\u201d files\n\n### PoC\nIn the following scenario, an attacker could upload a file called `shell.php` with an `image/png` MIME type and execute it on the remote server.\n```php\nclass SomeComponent extends Component\n{\n use WithFileUploads;\n\n #[Validate(\u0027image|extensions:png\u0027)]\n public $file;\n\n public function save()\n {\n $this-\u003evalidate();\n\n $this-\u003efile-\u003estoreAs(\n path: \u0027images\u0027,\n name: $this-\u003efile-\u003egetClientOriginalName(),\n options: [\u0027disk\u0027 =\u003e \u0027public\u0027],\n );\n }\n}\n```\n\n",
"id": "GHSA-f3cx-396f-7jqp",
"modified": "2024-10-09T23:52:22Z",
"published": "2024-10-08T22:19:16Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/livewire/livewire/security/advisories/GHSA-f3cx-396f-7jqp"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47823"
},
{
"type": "WEB",
"url": "https://github.com/livewire/livewire/pull/8624"
},
{
"type": "WEB",
"url": "https://github.com/livewire/livewire/commit/70503b79f5db75a1eac9bf55826038a6ee5a16d5"
},
{
"type": "WEB",
"url": "https://github.com/livewire/livewire/commit/cd168c6212ea13d13b82b3132485741f82d9fad9"
},
{
"type": "PACKAGE",
"url": "https://github.com/livewire/livewire"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Livewire Remote Code Execution on File Uploads"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…