Miggo Logo

GHSA-6jvx-8ch9-j2jr: Laravel Cookie serialization vulnerability

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
5/15/2024
Updated
5/15/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
laravel/frameworkcomposer>= 5.5.0, < 5.6.305.6.30

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unsafe deserialization of cookie values after decryption. Prior to Laravel 5.6.30, the framework allowed serialized cookies by default through the EncryptCookies middleware's $serialize property. The Encrypter::decrypt method would call unserialize() on decrypted data when serialization was enabled, creating a CWE-502 vulnerability. The patch in 5.6.30 disabled serialization by default, removing this unsafe deserialization path. The Encrypter::decrypt method is directly responsible for the vulnerable deserialization when handling serialized cookies.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

L*r*v*l *.*.** is * s**urity r*l**s* o* L*r*v*l *n* is r**omm*n*** *s *n imm**i*t* up*r*** *or *ll us*rs. L*r*v*l *.*.** *lso *ont*ins * *r**kin* ***n** to *ooki* *n*ryption *n* s*ri*liz*tion lo*i*. R***r to [l*r*v*l **visory](*ttps://l*r*v*l.*om/*o*

Reasoning

T** vuln*r**ility st*ms *rom uns*** **s*ri*liz*tion o* *ooki* v*lu*s **t*r ***ryption. Prior to L*r*v*l *.*.**, t** *r*m*work *llow** s*ri*liz** *ooki*s *y ****ult t*rou** t** `*n*rypt*ooki*s` mi**l*w*r*'s `$s*ri*liz*` prop*rty. T** `*n*rypt*r::***ry