CVE-2017-16894

In Laravel framework through 5.5.21, remote attackers can obtain sensitive information (such as externally usable passwords) via a direct request for the /.env URI. NOTE: this CVE is only about Laravel framework's writeNewEnvironmentFileWith function in src/Illuminate/Foundation/Console/KeyGenerateCommand.php, which uses file_put_contents without restricting the .env permissions. The .env filename is not used exclusively by Laravel framework.
Configurations

Configuration 1 (hide)

cpe:2.3:a:laravel:laravel:*:*:*:*:*:*:*:*

History

14 Feb 2024, 01:17

Type Values Removed Values Added
References () http://whiteboyz.xyz/laravel-env-file-vuln.html - Third Party Advisory () http://whiteboyz.xyz/laravel-env-file-vuln.html - Third Party Advisory, URL Repurposed

Information

Published : 2017-11-20 01:29

Updated : 2024-02-14 01:17


NVD link : CVE-2017-16894

Mitre link : CVE-2017-16894

CVE.ORG link : CVE-2017-16894


JSON object : View

Products Affected

laravel

  • laravel
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor