Wednesday, April 2, 2025

Laravel admin bundle Voyager susceptible to one-click RCE flaw

Laravel admin bundle Voyager susceptible to one-click RCE flaw

Three vulnerabilities found within the open-source PHP bundle Voyager for managing Laravel functions could possibly be used for distant code execution assaults.

The problems stay unfixed and could be exploited towards an authenticated Voyager consumer that clicks on a malicious hyperlink.

Vulnerability researchers at SonarSource, a code high quality and safety firm, say that they tried to report the failings to the Voyager maintainers however obtained no reply inside the 90-day window the corporate offers as per its vulnerability disclosure coverage.

Vulnerability particulars

The SonarQube Cloud crew discovered the primary vulnerability in Voyager, an arbitrary file write, throughout its routine scans. Trying nearer on the mission, they found further safety points that could possibly be mixed to run one-click distant code execution assaults on reachable Voyager situations.

The three flaws are summarizes as follows:

  • CVE-2024-55417 – Voyager’s media add characteristic permits attackers to add malicious recordsdata by bypassing MIME-type verification. By crafting a polyglot file that seems as a picture or video however incorporates executable PHP code, an attacker can obtain distant code execution if the file is processed on the server.
  • CVE-2024-55416 – The /admin/compass endpoint in Voyager improperly sanitizes consumer enter, permitting attackers to inject JavaScript into popup messages. If an authenticated admin clicks on a malicious hyperlink, the script executes of their browser, doubtlessly permitting attackers to carry out actions on their behalf, together with escalating to distant code execution.
  • CVE-2024-55415 – A flaw within the file administration system allows attackers to govern file paths and delete or entry arbitrary recordsdata on the server. By exploiting this, attackers can disrupt companies, erase important recordsdata, or extract delicate info.

In response to SonarQube Cloud researchers, they reported the three points to Voyager maintainers over e mail and GitHub since September 11, 2024, however obtained no communication again.

Within the 90-day disclosure interval, they tried a number of instances to acquire a reply and inform that the general public disclosure date was approaching.

The researchers say that in addition they opened a safety report by way of GitHub on November 28 and that they notified the Voyager maintainers that the 90-day disclosure window expired and so they had been about to share the technical particulars publicly.

Influence and suggestions

Voyager is primarily utilized by Laravel builders who want a pre-built admin panel to handle their functions.

Typical customers are internet improvement corporations, startups, freelance builders, Laravel hobbyists, and usually, small to medium-sized companies that use Laravel for inner instruments or CMS-based functions.

The Voyager mission is very standard because it has been forked 2,700 instances on GitHub, obtained greater than 11,800 stars and counts tens of millions of downloads.

Provided that the three flaws SonarQube found stay unpatched, Voyager customers ought to take into account limiting entry to trusted customers solely, limiting “browse_media” permissions to stop unauthorized file uploads, and utilizing role-based entry management (RBAC) to attenuate publicity.

Server-level safety measures embody disabling the execution of PHP recordsdata, utilizing strict MIME kind validation to reject polyglot recordsdata, and commonly monitoring logs for uncommon file add or entry exercise.

If safety is important, keep away from utilizing Voyager in manufacturing environments till official patches are out, or take into account migrating to a different Laravel admin panel.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles