Hi Team, Here is the exploit information for CVE-2021-45040.
Below is summary of timeline for reference: 1. Contact developer (security contact: Freek) regarding the vulnerability at Mon 12/13/2021 11:42 AM (GMT+8) 2. Contact CERT.org at Mon 12/13/2021 10:36 PM 3. Submit CVE Request to Mitre at Mon 12/13/2021 11:30 PM 4. No response from vendor until now. 5. Possible solution had been documented by our research team: https://cybersecthreat.com/2022/03/14/cve-2021-45040/ Best, Kelvin Yip CyberSecThreat
# Exploit Title: Laravel Media Library Pro <=2.1.6 - Arbitrary File Upload (Unauthenticated) # Google Dork: - # Date: Mar 13, 2022 # Exploit Author: Kelvin Yip <[email protected]> # Vendor Homepage: https://spatie.be/ # Software Link: https://spatie.be/products/media-library-pro # Version: <=1.17.10 & <=2.1.6 # Tested on: Laradock (PHP 8.0) inside Ubuntu 20.04 # CVE : CVE-2021-45040 ####################################################################################################### Description: The Spatie media-library-pro library through 1.17.10 & 2.1.6 for Laravel allows remote attackers to upload executable files via the uploads route. ####################################################################################################### Xploit : Arbitrary File Upload (Unauthenticated) Default URL: http://server/api/media-library-pro/uploads OR http://server/media-library-pro/uploads Note: The URL can be changed by developer. Upload a PHP webshell or shell file with 3 parameters: (uuid, name and file), the JSON response will contain âoriginal_urlâ, access the URL in the browser to get the shell access. ####################################################################################################### Additional Information for setup, test and solutions: https://cybersecthreat.com/2022/03/14/cve-2021-45040/ #######################################################################################################
_______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
