First published: Tue Oct 08 2024(Updated: )
In livewire/livewire prior to `v2.12.7` and `v3.5.2`, the file extension of an uploaded file is guessed based on the MIME type. As a result, the actual file extension from the file name is not validated. An attacker can therefore bypass the validation by uploading a file with a valid MIME type (e.g., `image/png`) and a “.php” file extension. If the following criteria are met, the attacker can carry out an RCE attack: - Filename is composed of the original file name using `$file->getClientOriginalName()` - Files stored directly on your server in a public storage disk - Webserver is configured to execute “.php” files ### PoC In the following scenario, an attacker could upload a file called `shell.php` with an `image/png` MIME type and execute it on the remote server. ```php class SomeComponent extends Component { use WithFileUploads; #[Validate('image|extensions:png')] public $file; public function save() { $this->validate(); $this->file->storeAs( path: 'images', name: $this->file->getClientOriginalName(), options: ['disk' => 'public'], ); } } ```
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/livewire/livewire | <2.12.7 | 2.12.7 |
composer/livewire/livewire | >=3.0.0-beta.1<3.5.2 | 3.5.2 |
<2.12.7 | ||
>=3.0.0<3.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47823 is considered a moderate severity vulnerability due to the potential for file upload attacks.
To fix CVE-2024-47823, update livewire/livewire to version 2.12.7 or 3.5.2 or later.
CVE-2024-47823 affects users of livewire/livewire versions prior to 2.12.7 and between 3.0.0-beta.1 and 3.5.2.
CVE-2024-47823 is a file upload vulnerability that allows attackers to bypass file extension validation.
Yes, exploiting CVE-2024-47823 could potentially lead to arbitrary code execution or other attacks if malicious files are uploaded.