First published: Wed May 15 2024(Updated: )
The Laravel Encrypter component is susceptible to a vulnerability that may result in decryption failure, leading to an unexpected return of `false`. Exploiting this issue requires the attacker to manipulate the encrypted payload before decryption. When combined with weak type comparisons in the application's code, such as the example below: ``` <?php $decyptedValue = decrypt($secret); if ($decryptedValue == '') { // Code is run even though decrypted value is false... } ```
Affected Software | Affected Version | How to fix |
---|---|---|
composer/laravel/framework | >=5.6.0<5.6.15 | 5.6.15 |
composer/laravel/framework | <5.5.40 | 5.5.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-7852-w36x-6mf6 is considered moderate due to the potential for an attacker to exploit decryption failures.
To fix GHSA-7852-w36x-6mf6, update the Laravel framework to version 5.6.15 or 5.5.40.
Developers using Laravel frameworks versions from 5.6.0 up to 5.6.14 or 5.5 up to 5.5.40 are affected by GHSA-7852-w36x-6mf6.
If GHSA-7852-w36x-6mf6 is exploited, it may result in decryption failures and unexpected return of false values.
There is no known workaround for GHSA-7852-w36x-6mf6; patching to the recommended versions is advised.