Closed walkerxiong closed 10 months ago
Hi, @magl0
I want to implement Remote Code Execution in laravel/framework | CVE-2019-9081 detection for this project.
Vulnerability detail: Score: 9.8 Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:P/I:P/A:P
Versions: >=5.7.0, <5.7.27
Reference: https://nvd.nist.gov/vuln/detail/CVE-2019-9081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9081
The vulnerability should be remotely exploitable without authentication and user interaction. Yes.
The detector should provide a reliable false-positive free detection report. Yes.
The detection capability should be easy to verify using both vulnerable and fixed Docker images. Yes.
The vulnerability should have a relatively large impact radius. Yes.
Please let me know if this is in scope as I've already made the development . No
Best regards, walkerxiong
Hi @walkerxiong,
I am closing this issue as it is getting a bit old.
~tooryx
Hi, @magl0
I want to implement Remote Code Execution in laravel/framework | CVE-2019-9081 detection for this project.
Vulnerability detail: Score: 9.8 Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:P/I:P/A:P
Versions: >=5.7.0, <5.7.27
Reference: https://nvd.nist.gov/vuln/detail/CVE-2019-9081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9081
The vulnerability should be remotely exploitable without authentication and user interaction. Yes.
The detector should provide a reliable false-positive free detection report. Yes.
The detection capability should be easy to verify using both vulnerable and fixed Docker images. Yes.
The vulnerability should have a relatively large impact radius. Yes.
Please let me know if this is in scope as I've already made the development . No
Best regards, walkerxiong