First published: Tue Jan 12 2021(Updated: )
Laravel Ignition contains a file upload vulnerability that allows unauthenticated remote attackers to execute malicious code due to insecure usage of file_get_contents() and file_put_contents().
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/facade/ignition | >=2.5.0<2.5.2>=2.0.0<2.4.2<1.16.14 | |
Laravel Ignition | ||
All of | ||
Laravel Ignition | <2.5.2 | |
Laravel Framework | <8.4.2 | |
Laravel Ignition | <2.5.2 | |
Laravel Framework | <8.4.2 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3129 is considered a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2021-3129, upgrade Ignition to version 2.5.2 or later.
CVE-2021-3129 affects versions of Ignition prior to 2.5.2.
CVE-2021-3129 is a file upload vulnerability that can lead to remote code execution.
Yes, CVE-2021-3129 can be exploited by unauthenticated remote attackers.