GSD-2021-21979
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
In Bitnami Containers, all Laravel container versions prior to: 6.20.0-debian-10-r107 for Laravel 6, 7.30.1-debian-10-r108 for Laravel 7 and 8.5.11-debian-10-r0 for Laravel 8, the file /tmp/app/.env is generated at the time that the docker image bitnami/laravel was built, and the value of APP_KEY is fixed under certain conditions. This value is crucial for the security of the application and must be randomly generated per Laravel installation. If your application's encryption key is in the hands of a malicious party, that party could craft cookie values using the encryption key and exploit vulnerabilities inherent to PHP object serialization / unserialization, such as calling arbitrary class methods within your application.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2021-21979",
"description": "In Bitnami Containers, all Laravel container versions prior to: 6.20.0-debian-10-r107 for Laravel 6, 7.30.1-debian-10-r108 for Laravel 7 and 8.5.11-debian-10-r0 for Laravel 8, the file /tmp/app/.env is generated at the time that the docker image bitnami/laravel was built, and the value of APP_KEY is fixed under certain conditions. This value is crucial for the security of the application and must be randomly generated per Laravel installation. If your application\u0027s encryption key is in the hands of a malicious party, that party could craft cookie values using the encryption key and exploit vulnerabilities inherent to PHP object serialization / unserialization, such as calling arbitrary class methods within your application.",
"id": "GSD-2021-21979"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-21979"
],
"details": "In Bitnami Containers, all Laravel container versions prior to: 6.20.0-debian-10-r107 for Laravel 6, 7.30.1-debian-10-r108 for Laravel 7 and 8.5.11-debian-10-r0 for Laravel 8, the file /tmp/app/.env is generated at the time that the docker image bitnami/laravel was built, and the value of APP_KEY is fixed under certain conditions. This value is crucial for the security of the application and must be randomly generated per Laravel installation. If your application\u0027s encryption key is in the hands of a malicious party, that party could craft cookie values using the encryption key and exploit vulnerabilities inherent to PHP object serialization / unserialization, such as calling arbitrary class methods within your application.",
"id": "GSD-2021-21979",
"modified": "2023-12-13T01:23:10.375961Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@vmware.com",
"ID": "CVE-2021-21979",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Bitnami Containers",
"version": {
"version_data": [
{
"version_value": "All Laravel container versions prior to: 6.20.0-debian-10-r107 for Laravel 6, 7.30.1-debian-10-r108 for Laravel 7 and 8.5.11-debian-10-r0 for Laravel 8"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Bitnami Containers, all Laravel container versions prior to: 6.20.0-debian-10-r107 for Laravel 6, 7.30.1-debian-10-r108 for Laravel 7 and 8.5.11-debian-10-r0 for Laravel 8, the file /tmp/app/.env is generated at the time that the docker image bitnami/laravel was built, and the value of APP_KEY is fixed under certain conditions. This value is crucial for the security of the application and must be randomly generated per Laravel installation. If your application\u0027s encryption key is in the hands of a malicious party, that party could craft cookie values using the encryption key and exploit vulnerabilities inherent to PHP object serialization / unserialization, such as calling arbitrary class methods within your application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "APP_KEY fixed in the container image"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/bitnami/bitnami-docker-laravel/issues/139",
"refsource": "MISC",
"url": "https://github.com/bitnami/bitnami-docker-laravel/issues/139"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "6.0.2-debian-9-r22",
"versionStartIncluding": "6.0.2-debian-9-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "6.4.0-debian-9-r31",
"versionStartIncluding": "6.4.0-debian-9-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "6.5.2-debian-9-r20",
"versionStartIncluding": "6.5.2-debian-9-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "6.8.0-debian-9-r26",
"versionStartIncluding": "6.8.0-debian-9-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "6.12.0-debian-10-r33",
"versionStartIncluding": "6.12.0-debian-9-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "6.18.0-debian-10-r21",
"versionStartIncluding": "6.18.0-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "6.18.3-debian-10-r22",
"versionStartIncluding": "6.18.3-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "6.18.8-debian-10-r110",
"versionStartIncluding": "6.18.8-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "6.18.35-debian-10-r66",
"versionStartIncluding": "6.18.35-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:6.19.0-debian-10-r0:*:*:*:*:laravel:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndExcluding": "6.20.0-debian-10-r107",
"versionStartIncluding": "6.20.0-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "7.0.0-debian-10-r7",
"versionStartIncluding": "7.0.0-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "7.3.0-debian-10-r20",
"versionStartIncluding": "7.3.0-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "7.6.0-debian-10-r38",
"versionStartIncluding": "7.6.0-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "7.12.0-debian-10-r72",
"versionStartIncluding": "7.12.0-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "7.25.0-debian-10-r16",
"versionStartIncluding": "7.25.0-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "7.28.0-debian-10-r50",
"versionStartIncluding": "7.28.0-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:7.29.0-debian-10-r0:*:*:*:*:laravel:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:7.30.0-debian-10-r0:*:*:*:*:laravel:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndExcluding": "7.30.1-debian-10-r108",
"versionStartIncluding": "7.30.1-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "8.0.1-debian-10-r7",
"versionStartIncluding": "8.0.1-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "8.0.3-debian-10-r18",
"versionStartIncluding": "8.0.3-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "8.1.0-debian-10-r7",
"versionStartIncluding": "8.1.0-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "8.2.0-debian-10-r8",
"versionStartIncluding": "8.2.0-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:8.3.0-debian-10-r0:*:*:*:*:laravel:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "8.4.0-debian-10-r10",
"versionStartIncluding": "8.4.0-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "8.4.1-debian-10-r6",
"versionStartIncluding": "8.4.1-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "8.4.2-debian-10-r4",
"versionStartIncluding": "8.4.2-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "8.4.3-debian-10-r6",
"versionStartIncluding": "8.4.3-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "8.4.4-debian-10-r6",
"versionStartIncluding": "8.4.4-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:8.5.2-debian-10-r0:*:*:*:*:laravel:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:8.5.2-debian-10-r1:*:*:*:*:laravel:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:8.5.3-debian-10-r0:*:*:*:*:laravel:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:8.5.4-debian-10-r0:*:*:*:*:laravel:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:8.5.4-debian-10-r1:*:*:*:*:laravel:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "8.5.5-debian-10-r11",
"versionStartIncluding": "8.5.5-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "8.5.6-debian-10-r13",
"versionStartIncluding": "8.5.6-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "8.5.7-debian-10-r6",
"versionStartIncluding": "8.5.7-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "8.5.8-debian-10-r5",
"versionStartIncluding": "8.5.8-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "8.5.9-debian-10-r25",
"versionStartIncluding": "8.5.9-debian-10-r0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:bitnami:containers:*:*:*:*:*:laravel:*:*",
"cpe_name": [],
"versionEndIncluding": "8.5.10-debian-10-r6",
"versionStartIncluding": "8.5.10-debian-10-r0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@vmware.com",
"ID": "CVE-2021-21979"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "In Bitnami Containers, all Laravel container versions prior to: 6.20.0-debian-10-r107 for Laravel 6, 7.30.1-debian-10-r108 for Laravel 7 and 8.5.11-debian-10-r0 for Laravel 8, the file /tmp/app/.env is generated at the time that the docker image bitnami/laravel was built, and the value of APP_KEY is fixed under certain conditions. This value is crucial for the security of the application and must be randomly generated per Laravel installation. If your application\u0027s encryption key is in the hands of a malicious party, that party could craft cookie values using the encryption key and exploit vulnerabilities inherent to PHP object serialization / unserialization, such as calling arbitrary class methods within your application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/bitnami/bitnami-docker-laravel/issues/139",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/bitnami/bitnami-docker-laravel/issues/139"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
},
"lastModifiedDate": "2021-03-18T20:24Z",
"publishedDate": "2021-03-03T17:15Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…