CVE CVE

CVE-2018-15133

CISA Known Exploited Vulnerability (KEV)

Laravel Deserialization of Untrusted Data Vulnerability

January 16, 2024

February 6, 2024

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Description

In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack.

Weakness Enumeration

CWE-ID CWE Name

CWE-502
Deserialization of Untrusted Data

Known Affected Software Configurations


cpe:2.3:a:laravel:laravel:8.6.11:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.6.3:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.5.20:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.6.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.6.4:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.5.11:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.6.2:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.5.19:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.5.14:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.5.23:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.5.13:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.6.12:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.6.5:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.5.12:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.6.7:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.5.24:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.6.9:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.5.22:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.6.6:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.5.17:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.5.21:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.5.16:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.5.10:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.6.10:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.5.15:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.5.18:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.6.8:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.5.9:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.22.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.21.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.20.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.20.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.19.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.18.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.18.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.17.2:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.17.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.17.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.16.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.16.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.15.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.14.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.13.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.12.3:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.12.2:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.12.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.12.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.11.2:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.11.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.11.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.10.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.9.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.8.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.7.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.7.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.6.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:8.0.4:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.30.4:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.30.3:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.30.2:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.29.3:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.29.2:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.29.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.28.4:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.28.3:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.28.2:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.28.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.27.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.26.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.26.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.23.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.23.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.22.4:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.22.3:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.22.2:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.22.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.22.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.21.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.20.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.19.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.19.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.18.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.17.2:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.17.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.17.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.16.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.16.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.15.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.14.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.14.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.13.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.11.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.10.3:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.10.2:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.10.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.10.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.9.2:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.9.1:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.9.0:*:*:*:*:*:*:*

cpe:2.3:a:laravel:laravel:7.8.1:*:*:*:*:*:*:*

Details

Source:
NVD
Published:
Updated:

Risk information

CVSS v3

Base score:
8.1
Severity:

HIGH

Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2

Base score:
6.8
Severity:

MEDIUM

Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P