Laravel Media Library Pro 2.1.6 Shell Upload

Laravel Media Library Pro versions 2.1.6 and below as well as 1.17.10 and below suffer from a remote shell upload vulnerability.


MD5 | 1228b251a7f271fd7da635499b0bd342

# Exploit Title: Laravel Media Library Pro <=2.1.6 - Arbitrary File Upload (Unauthenticated)  
# Google Dork: -
# Date: Mar 13, 2022
# Exploit Author: Kelvin Yip <[email protected]>
# Vendor Homepage: https://spatie.be/
# Software Link: https://spatie.be/products/media-library-pro
# Version: <=1.17.10 & <=2.1.6
# Tested on: Laradock (PHP 8.0) inside Ubuntu 20.04
# CVE : CVE-2021-45040

#######################################################################################################
Description:

The Spatie media-library-pro library through 1.17.10 & 2.1.6 for Laravel allows remote attackers to upload executable files via the uploads route.

#######################################################################################################
Xploit : Arbitrary File Upload (Unauthenticated)

Default URL: http://server/api/media-library-pro/uploads OR http://server/media-library-pro/uploads

Note: The URL can be changed by developer.

Upload a PHP webshell or shell file with 3 parameters: (uuid, name and file), the JSON response will contain “original_url”, access the URL in the browser to get the shell access.

#######################################################################################################
Additional Information for setup, test and solutions: https://cybersecthreat.com/2022/03/14/cve-2021-45040/
#######################################################################################################

Related Posts