Livewire is a full-stack framework for Laravel that allows for dynamic UI components without leaving PHP. In livewire/livewire prior to `2.12.7` and `v3.5.2`, the file extension of an uploaded file is guessed based on the MIME type. As a result, the actual file extension from the file name is not validated. An attacker can therefore bypass the validation by uploading a file with a valid MIME type (e.g., `image/png`) and a “.php” file extension. If the following criteria are met, the attacker can carry out an RCE attack: 1. Filename is composed of the original file name using `$file->getClientOriginalName()`. 2. Files stored directly on your server in a public storage disk. 3. Webserver is configured to execute “.php” files. This issue has been addressed in release versions `2.12.7` and `3.5.2`. All users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/livewire/livewire/commit/70503b79f5db75a1eac9bf55826038a6ee5a16d5 | Patch |
https://github.com/livewire/livewire/commit/cd168c6212ea13d13b82b3132485741f82d9fad9 | Patch |
https://github.com/livewire/livewire/pull/8624 | Patch Issue Tracking |
https://github.com/livewire/livewire/security/advisories/GHSA-f3cx-396f-7jqp | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
06 Mar 2025, 14:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/livewire/livewire/security/advisories/GHSA-f3cx-396f-7jqp - Exploit, Vendor Advisory | |
References | () https://github.com/livewire/livewire/pull/8624 - Patch, Issue Tracking | |
References | () https://github.com/livewire/livewire/commit/cd168c6212ea13d13b82b3132485741f82d9fad9 - Patch | |
References | () https://github.com/livewire/livewire/commit/70503b79f5db75a1eac9bf55826038a6ee5a16d5 - Patch | |
CPE | cpe:2.3:a:laravel:livewire:*:*:*:*:*:*:*:* | |
First Time |
Laravel
Laravel livewire |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-434 |
10 Oct 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Livewire is a full-stack framework for Laravel that allows for dynamic UI components without leaving PHP. In livewire/livewire prior to `2.12.7` and `v3.5.2`, the file extension of an uploaded file is guessed based on the MIME type. As a result, the actual file extension from the file name is not validated. An attacker can therefore bypass the validation by uploading a file with a valid MIME type (e.g., `image/png`) and a “.php” file extension. If the following criteria are met, the attacker can carry out an RCE attack: 1. Filename is composed of the original file name using `$file->getClientOriginalName()`. 2. Files stored directly on your server in a public storage disk. 3. Webserver is configured to execute “.php” files. This issue has been addressed in release versions `2.12.7` and `3.5.2`. All users are advised to upgrade. There are no known workarounds for this vulnerability. |
08 Oct 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-08 18:15
Updated : 2025-03-06 14:24
NVD link : CVE-2024-47823
Mitre link : CVE-2024-47823
JSON object : View
Products Affected
laravel
- livewire
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type