Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-52301", "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "state": "PUBLISHED", "assignerShortName": "GitHub_M", "dateReserved": "2024-11-06T19:00:26.396Z", "datePublished": "2024-11-12T19:32:14.415Z", "dateUpdated": "2024-12-21T17:02:39.839Z"}, "containers": {"cna": {"title": "Laravel allows environment manipulation via query string", "problemTypes": [{"descriptions": [{"cweId": "CWE-88", "lang": "en", "description": "CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')", "type": "CWE"}]}], "metrics": [{"cvssV4_0": {"attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "HIGH", "vulnAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "subAvailabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N", "version": "4.0"}}], "references": [{"name": "https://github.com/laravel/framework/security/advisories/GHSA-gv7v-rgg6-548h", "tags": ["x_refsource_CONFIRM"], "url": "https://github.com/laravel/framework/security/advisories/GHSA-gv7v-rgg6-548h"}], "affected": [{"vendor": "laravel", "product": "framework", "versions": [{"version": "< 6.20.45", "status": "affected"}, {"version": ">= 7.0.0, < 7.30.7", "status": "affected"}, {"version": ">= 8.0.0, < 8.83.28", "status": "affected"}, {"version": ">= 9.0.0, < 9.52.17", "status": "affected"}, {"version": ">= 10.0.0, < 10.48.23", "status": "affected"}, {"version": ">= 11.0.0, < 11.31.0", "status": "affected"}]}], "providerMetadata": {"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M", "dateUpdated": "2024-11-12T19:32:14.415Z"}, "descriptions": [{"lang": "en", "value": "Laravel is a web application framework. When the register_argc_argv php directive is set to on , and users call any URL with a special crafted query string, they are able to change the environment used by the framework when handling the request. The vulnerability fixed in 6.20.45, 7.30.7, 8.83.28, 9.52.17, 10.48.23, and 11.31.0. The framework now ignores argv values for environment detection on non-cli SAPIs."}], "source": {"advisory": "GHSA-gv7v-rgg6-548h", "discovery": "UNKNOWN"}}, "adp": [{"affected": [{"vendor": "laravel", "product": "framework", "cpes": ["cpe:2.3:a:laravel:framework:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "6.20.45", "versionType": "custom"}, {"version": "0", "status": "affected", "lessThanOrEqual": "7.0.0", "versionType": "custom"}, {"version": "0", "status": "affected", "lessThan": "7.30.7", "versionType": "custom"}, {"version": "0", "status": "affected", "lessThanOrEqual": "8.0.0", "versionType": "custom"}, {"version": "0", "status": "affected", "lessThan": "8.83.28", "versionType": "custom"}, {"version": "0", "status": "affected", "lessThanOrEqual": "9.0.0", "versionType": "custom"}, {"version": "0", "status": "affected", "lessThan": "9.52.17", "versionType": "custom"}, {"version": "0", "status": "affected", "lessThanOrEqual": "10.0.0", "versionType": "custom"}, {"version": "0", "status": "affected", "lessThan": "10.48.23", "versionType": "custom"}, {"version": "0", "status": "affected", "lessThanOrEqual": "11.0.0", "versionType": "custom"}, {"version": "0", "status": "affected", "lessThan": "11.31.0", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-11-13T14:51:08.466106Z", "id": "CVE-2024-52301", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-11-21T16:14:52.925Z"}}, {"title": "CVE Program Container", "references": [{"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00019.html"}], "providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-12-21T17:02:39.839Z"}}]}}