lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <HK0PR01MB24032195818E56CABCF69D3DA20E9@HK0PR01MB2403.apcprd01.prod.exchangelabs.com>
Date: Sun, 13 Mar 2022 17:13:46 +0000
From: Kelvin Yip <kelvin@...ersecthreat.com>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: [FD] CVE-2021-45040 - Laravel Media Library Pro <=2.1.6 - Arbitrary
 File Upload (Unauthenticated)

Hi Team,

Here is the exploit information for CVE-2021-45040.

Below is summary of timeline for reference:

  1.  Contact developer (security contact: Freek) regarding the vulnerability at Mon 12/13/2021 11:42 AM (GMT+8)
  2.  Contact CERT.org at Mon 12/13/2021 10:36 PM
  3.  Submit CVE Request to Mitre at Mon 12/13/2021 11:30 PM
  4.  No response from vendor until now.
  5.  Possible solution had been documented by our research team:  https://cybersecthreat.com/2022/03/14/cve-2021-45040/

Best,
Kelvin Yip
CyberSecThreat

View attachment "CVE-2021-45040.txt" of type "text/plain" (1489 bytes)


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ