First published: Tue Apr 16 2024(Updated: )
An issue in Laravel Framework 8 through 11 might allow a remote attacker to discover database credentials in storage/logs/laravel.log. NOTE: this is disputed by multiple third parties because the owner of a Laravel Framework installation can choose to have debugging logs, but needs to set the access control appropriately for the type of data that may be logged.
Credit: cve@mitre.org Huseein Amer
Affected Software | Affected Version | How to fix |
---|---|---|
Laravel | >=8<11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29291 is considered a moderate severity vulnerability due to the potential for remote attackers to access sensitive database credentials.
To fix CVE-2024-29291, ensure that your Laravel version is upgraded to the latest release beyond version 11 and avoid enabling debugging logs in production.
CVE-2024-29291 affects all users of Laravel Framework versions 8 through 11 who have debugging logs enabled.
Yes, CVE-2024-29291 can be exploited remotely if the Laravel logs are improperly configured to be accessible.
The potential impact of CVE-2024-29291 includes exposure of sensitive database credentials, which can lead to unauthorized access to the database.