PT-2024-32835 · Unknown · Livewire/Livewire
Angelej
·
Published
2024-10-08
·
Updated
2024-11-07
·
CVE-2024-47823
9.8
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
livewire/livewire versions prior to 2.12.7 and v3.5.2
Description:
The issue is related to insufficient validation of uploaded file extensions in the Livewire framework for Laravel. An attacker can bypass validation by uploading a file with a valid MIME type and a malicious file extension, such as ".php". If certain criteria are met, including the use of the original file name, storage on a public disk, and a web server configured to execute ".php" files, the attacker can carry out a remote code execution (RCE) attack.
Recommendations:
To resolve the issue, upgrade to release versions 2.12.7 or 3.5.2. As a temporary workaround, consider disabling the use of `$file->getClientOriginalName()` for filename composition, and restrict file storage to non-public disks. Additionally, ensure that the web server is not configured to execute ".php" files in the storage directory. There are no known workarounds for this vulnerability, and all users are advised to upgrade to a patched version.
Fix
RCE
Unrestricted File Upload
Related Identifiers
Affected Products
References · 21
- https://github.com/livewire/livewire/security/advisories/GHSA-f3cx-396f-7jqp⭐ 22721 🔗 1605 · Vendor Advisory
- https://github.com/livewire/livewire/pull/8624⭐ 22721 🔗 1605 · Patch
- https://github.com/livewire/livewire/commit/cd168c6212ea13d13b82b3132485741f82d9fad9⭐ 22721 🔗 1605 · Patch
- https://github.com/livewire/livewire/commit/70503b79f5db75a1eac9bf55826038a6ee5a16d5⭐ 22721 🔗 1605 · Patch
- https://osv.dev/vulnerability/GHSA-f3cx-396f-7jqp · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-01106 · Security Note
- https://osv.dev/vulnerability/CVE-2024-47823 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2024-47823 · Security Note
- https://github.com/livewire/livewire⭐ 22990 🔗 1652 · Note
- https://twitter.com/the_yellow_fall/status/1844190028441977250 · Twitter Post
- https://twitter.com/oktsec/status/1843767760267935939 · Twitter Post
- https://twitter.com/Dinosn/status/1844215627428552946 · Twitter Post
- https://t.me/cvedetector/7392 · Telegram Post
- https://twitter.com/angelej_dev/status/1843757568616956058 · Twitter Post
- https://twitter.com/angelej_dev/status/1854649382345621853 · Twitter Post