CVE-2022-31279: Unserialized Pop Chain in Laravel
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
6/8/2022
Updated
1/27/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| laravel/laravel | composer | <= 9.1.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability relies on a POP (Property-Oriented Programming) chain combining these two magic methods. The __destruct in PendingBroadcast initiates the chain by interacting with attacker-controlled event objects, while __call in Faker\Generator enables dynamic method dispatch. The provided POC demonstrates how these functions are exploited: PendingBroadcast's destructor triggers operations on a manipulated Faker\Generator object, whose __call method resolves to a dangerous system command. Though the advisory was withdrawn, the technical analysis and exploit code confirm these functions' roles in the chain.