Friday, March 14, 2025

Laravel admin package deal Voyager weak to one-click RCE flaw


Three vulnerabilities found within the open-source PHP package deal Voyager for managing Laravel purposes may very well be used for distant code execution assaults.

The problems stay unfixed and will be exploited in opposition to an authenticated Voyager person that clicks on a malicious hyperlink.

Vulnerability researchers at SonarSource, a code high quality and safety firm, say that they tried to report the issues to the Voyager maintainers however acquired no reply throughout the 90-day window the corporate gives as per its vulnerability disclosure coverage.

Vulnerability particulars

The SonarQube Cloud crew discovered the primary vulnerability in Voyager, an arbitrary file write, throughout its routine scans. Trying nearer on the mission, they found further safety points that may very well be mixed to run one-click distant code execution assaults on reachable Voyager situations.

The three flaws are summarizes as follows:

  • CVE-2024-55417 – Voyager’s media add characteristic permits attackers to add malicious information by bypassing MIME-type verification. By crafting a polyglot file that seems as a picture or video however accommodates executable PHP code, an attacker can obtain distant code execution if the file is processed on the server.
  • CVE-2024-55416 – The /admin/compass endpoint in Voyager improperly sanitizes person enter, permitting attackers to inject JavaScript into popup messages. If an authenticated admin clicks on a malicious hyperlink, the script executes of their browser, doubtlessly permitting attackers to carry out actions on their behalf, together with escalating to distant code execution.
  • CVE-2024-55415 – A flaw within the file administration system allows attackers to control file paths and delete or entry arbitrary information on the server. By exploiting this, attackers can disrupt companies, erase vital information, or extract delicate info.

In response to SonarQube Cloud researchers, they reported the three points to Voyager maintainers over e-mail and GitHub since September 11, 2024, however acquired no communication again.

Within the 90-day disclosure interval, they tried a number of occasions to acquire a reply and inform that the general public disclosure date was approaching.

The researchers say that in addition they opened a safety report through GitHub on November 28 and that they notified the Voyager maintainers that the 90-day disclosure window expired and so they had been about to share the technical particulars publicly.

Impression and suggestions

Voyager is primarily utilized by Laravel builders who want a pre-built admin panel to handle their purposes.

Typical customers are internet improvement corporations, startups, freelance builders, Laravel hobbyists, and customarily, small to medium-sized companies that use Laravel for inside instruments or CMS-based purposes.

The Voyager mission is extremely widespread because it has been forked 2,700 occasions on GitHub, acquired greater than 11,800 stars and counts hundreds of thousands of downloads.

On condition that the three flaws SonarQube found stay unpatched, Voyager customers ought to take into account proscribing entry to trusted customers solely, limiting “browse_media” permissions to stop unauthorized file uploads, and utilizing role-based entry management (RBAC) to reduce publicity.

Server-level safety measures embody disabling the execution of PHP information, utilizing strict MIME kind validation to reject polyglot information, and usually monitoring logs for uncommon file add or entry exercise.

If safety is vital, keep away from utilizing Voyager in manufacturing environments till official patches are out, or take into account migrating to a different Laravel admin panel.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com