Miggo Logo

GHSA-2ffv-r4r9-r8xr: Laravel RCE vulnerability in "cookie" session driver

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
5/15/2024
Updated
5/15/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
illuminate/cookiecomposer>= 4.1.0, < 6.18.316.18.31
illuminate/cookiecomposer>= 7.0.0, < 7.22.47.22.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing HMAC-based validation during cookie encryption/decryption. The pre-patch implementation in EncryptCookies middleware allowed arbitrary encrypted values to be accepted as valid cookies if an encryption oracle existed. The functions responsible for raw encryption/decryption (without HMAC context) are the core vulnerability points, as they enabled cookie forgery. The fix introduced HMAC prefixing in these methods, confirming their central role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ppli**tion's usin* t** "*ooki*" s*ssion *riv*r w*r* t** prim*ry *ppli**tions *****t** *y t*is vuln*r**ility. Sin** w* **v* not y*t r*l**s** * s**urity r*l**s* *or t** L*r*v*l *.* v*rsion o* t** *r*m*work, w* r**omm*n* t**t *ll *ppli**tions runnin* L

Reasoning

T** vuln*r**ility st*ms *rom missin* *M**-**s** `v*li**tion` *urin* *ooki* *n*ryption/***ryption. T** pr*-p*t** impl*m*nt*tion in `*n*rypt*ooki*s` mi**l*w*r* *llow** *r*itr*ry *n*rypt** v*lu*s to ** ****pt** *s v*li* *ooki*s i* *n *n*ryption or**l* *