CVE-2021-3129 – facade/ignition
Package
Manager: composer
Name: facade/ignition
Vulnerable Version: >=2.5.0 <2.5.2 || >=2.0.0 <2.4.2 || >=1.7.0 <1.16.14 || >=0 <1.6.15
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.94287 pctl0.99933
Details
Unauthenticated remote code execution in Ignition Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
Metadata
Created: 2021-03-29T20:23:46Z
Modified: 2021-03-23T00:13:45Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/03/GHSA-4qwp-7c67-jmcc/GHSA-4qwp-7c67-jmcc.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-4qwp-7c67-jmcc
Finding: F422
Auto approve: 1