CVE-2024-21546
PHP vulnerability analysis and mitigation

Overview

CVE-2024-21546 affects versions of the package unisharp/laravel-filemanager before 2.9.1. The vulnerability was discovered on December 18, 2024, and allows Remote Code Execution (RCE) through file upload functionality. The vulnerability affects the Laravel file management package used in web applications (NVD, CVE).

Technical details

The vulnerability exists in the file upload functionality where attackers can bypass security controls by using a valid mimetype and inserting the '.' character after the php file extension (e.g., 'filename.php.'). Although the application has mechanisms to prevent users from uploading files with extensions like PHP, HTML and mimetypes text/x-php, text/html, text/plain, this bypass technique allows for successful upload of malicious files. The vulnerability has received a CVSS v3.1 base score of 9.8 (Critical) and CVSS v4.0 score of 8.9 (High) (Snyk).

Impact

The vulnerability allows attackers to execute arbitrary code on the affected system through uploaded malicious files. This can lead to complete system compromise, as successful exploitation provides attackers with the ability to execute commands on the server hosting the vulnerable application (NVD).

Mitigation and workarounds

The vulnerability has been patched in version 2.9.1 of unisharp/laravel-filemanager. The fix includes additional validation to prevent special characters in file extensions. Users should upgrade to version 2.9.1 or later to address this vulnerability (GitHub Commit).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management