First published: Mon Nov 20 2017(Updated: )
In Laravel framework through 5.5.21, remote attackers can obtain sensitive information (such as externally usable passwords) via a direct request for the /.env URI. NOTE: this CVE is only about Laravel framework's writeNewEnvironmentFileWith function in src/Illuminate/Foundation/Console/KeyGenerateCommand.php, which uses file_put_contents without restricting the .env permissions. The .env filename is not used exclusively by Laravel framework.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Laravel Framework | <=5.5.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16894 is categorized as severe due to its potential for exposing sensitive environment variables.
To fix CVE-2017-16894, ensure that the /.env file is not publicly accessible by implementing proper web server configurations.
CVE-2017-16894 affects all Laravel framework versions up to and including 5.5.21.
CVE-2017-16894 can leak sensitive information such as passwords and other environmental variables.
Mitigation steps for CVE-2017-16894 include securing access to the service and restricting access to sensitive files.