Miggo Logo

CVE-2024-52301:
Laravel environment manipulation via query string

8.7

CVSS Score
4.0

Basic Information

EPSS Score
0.93203%
Published
11/12/2024
Updated
12/21/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Package NameEcosystemVulnerable VersionsFirst Patched Version
laravel/frameworkcomposer< 6.20.456.20.45
laravel/frameworkcomposer>= 7.0.0, < 7.30.77.30.7
laravel/frameworkcomposer>= 8.0.0, < 8.83.288.83.28
laravel/frameworkcomposer>= 9.0.0, < 9.52.179.52.17
laravel/frameworkcomposer>= 10.0.0, < 10.48.2310.48.23
laravel/frameworkcomposer>= 11.0.0, < 11.31.011.31.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from environment detection using argv parameters in web contexts. The resolution explicitly states ignoring argv for non-CLI SAPIs. The DetectEnvironment class is responsible for environment detection in Laravel, and its detectEnvironment() method would be the logical place where argv parsing occurred before the patch. The confidence is high because the vulnerability description directly matches this component's functionality and the patched behavior aligns with this method's responsibility.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## **s*ription W**n t** `r**ist*r_*r**_*r*v p*p` *ir**tiv* is s*t to `on` , *n* us*rs **ll *ny URL wit* * sp**i*l *r**t** qu*ry strin*, t**y *r* **l* to ***n** t** *nvironm*nt us** *y t** *r*m*work w**n **n*lin* t** r*qu*st. ## R*solution T** *r*m

Reasoning

T** vuln*r**ility st*ms *rom *nvironm*nt **t**tion usin* `*r*v` p*r*m*t*rs in w** *ont*xts. T** r*solution *xpli*itly st*t*s i*norin* `*r*v` *or non-*LI S*PIs. T** `**t**t*nvironm*nt` *l*ss is r*sponsi*l* *or *nvironm*nt **t**tion in L*r*v*l, *n* its