mirror of
https://github.com/0xMarcio/cve.git
synced 2026-04-21 09:56:14 +02:00
1.8 KiB
1.8 KiB
CVE-2017-16894
Description
In Laravel framework through 5.5.21, remote attackers can obtain sensitive information (such as externally usable passwords) via a direct request for the /.env URI. NOTE: this CVE is only about Laravel framework's writeNewEnvironmentFileWith function in src/Illuminate/Foundation/Console/KeyGenerateCommand.php, which uses file_put_contents without restricting the .env permissions. The .env filename is not used exclusively by Laravel framework.
POC
Reference
Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/20142995/Goby
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ArrestX/--POC
- https://github.com/Gutem/scans-exploits
- https://github.com/H4ckTh3W0r1d/Goby_POC
- https://github.com/HimmelAward/Goby_POC
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/NyxAzrael/Goby_POC
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Threekiii/Awesome-POC
- https://github.com/XiaomingX/awesome-poc-for-red-team
- https://github.com/Yucaerin/laravel
- https://github.com/Z0fhack/Goby_POC
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/duggytuxy/Data-Shield_IPv4_Blocklist
- https://github.com/duggytuxy/Intelligence_IPv4_Blocklist
- https://github.com/ibnurusdianto/CVE-2017-16894
- https://github.com/qiuluo-oss/Tiger
- https://github.com/v4p0r/rooon-fiuuu