- Description
- A vulnerability in Crater Invoice allows an unauthenticated attacker with knowledge of the APP_KEY to achieve remote command execution on the server by manipulating the laravel_session cookie, exploiting arbitrary deserialization through the encrypted session data. The exploitation vector of this vulnerability relies on an attacker obtaining Laravel's secret APP_KEY, which would allow them to decrypt and manipulate session cookies (laravel_session) containing serialized data. By altering this data and re-encrypting it with the APP_KEY, the attacker could trigger arbitrary deserialization on the server, potentially leading to remote command execution (RCE). The vulnerability is primarily exploited by accessing an exposed cookie and manipulating it using the secret key to gain malicious access to the server.
- Source
- cve@mitre.org
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-502
- Hype score
- Not currently trending
CVE-2024-55556 A vulnerability in Crater Invoice allows an unauthenticated attacker with knowledge of the APP_KEY to achieve remote command execution on the server by manipulating t… https://t.co/YUdeakN0os
@CVEnew
8 Jan 2025
289 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Three CVEs affecting common open source Laravel projects were released on our website today! They were presented @GreHackConf by our ninjas @_remsio_ and @Kainx42 🥷 🛡️ Snipe-IT: CVE-2024-48987 🛡️ InvoiceNinja: CVE-2024-55555 🛡️ Crater Invoice: CVE-2024-55556
@Synacktiv
13 Dec 2024
2279 Impressions
9 Retweets
23 Likes
7 Bookmarks
1 Reply
1 Quote