CVE-2018-15133
high-risk
Published 2018-08-09
In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack.
Do I need to act?
!
83.3% chance of exploitation in next 30 days
EPSS score — higher than 17% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (5)
Vendor Advisory
https://laravel.com/docs/5.6/upgrade#upgrade-5.6.30
Vendor Advisory
https://laravel.com/docs/5.6/upgrade#upgrade-5.6.30
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-...
63
/ 100
high-risk
Severity
24/34 · High
Exploitability
34/34 · Critical
Exposure
5/34 · Minimal