Laravel Security Update Advisory (CVE-2024-52301)

Overview

 

An update has been released to address vulnerabilities in Laravel. Users of the affected versions are advised to update to the latest version.
 

 

Affected Products

CVE-2024-52301

  • Laravel versions: ~ 6.20.45 (excluded)
  • Laravel versions: 7.0.0 (inclusive) ~ 7.30.7 (excluded)
  • Laravel versions: 8.0.0 (inclusive) ~ 8.83.28 (excluded)
  • Laravel versions: 9.0.0 (inclusive) ~ 9.52.17 (excluded)
  • Laravel versions: 10.0.0 (inclusive) ~ 10.48.23 (excluded)
  • Laravel versions: 11.0.0 (inclusive) ~ 11.31.0 (excluded)

 

 

Resolved Vulnerabilities

 

When PHP’s register_argc_argv directive is enabled, calling a URL with a specially crafted query string could allow attackers to alter the environment variables used by the framework when processing requests (CVE-2024-52301)

 

 

Vulnerability Patches

Vulnerability Patches have been made available in the latest update. Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.

 

CVE-2024-52301

  • Laravel version: 6.20.45
  • Laravel version: 7.30.7
  • Laravel version: 8.83.28
  • Laravel version: 9.52.17
  • Laravel version: 10.48.23
  • Laravel version: 11.31.0

 

 

Referenced Sites

[1] CVE-2024-52301 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-52301

[2] Environment manipulation via query string

https://github.com/laravel/framework/security/advisories/GHSA-gv7v-rgg6-548h