mirror of
				https://github.com/HackTricks-wiki/hacktricks.git
				synced 2025-10-10 18:36:50 +00:00 
			
		
		
		
	Update laravel.md
This commit is contained in:
		
							parent
							
								
									9f7faf12d7
								
							
						
					
					
						commit
						dd801febe4
					
				@ -89,7 +89,18 @@ curl -H "Cookie: laravel_session=<orig>; <cookie_name>=$(cat forged.txt)" https:
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
---
 | 
			
		||||
## Mass APP_KEY discovery via cookie brute-force
 | 
			
		||||
 | 
			
		||||
Because every fresh Laravel response sets at least 1 encrypted cookie (`XSRF-TOKEN` and usually `laravel_session`), **public internet scanners (Shodan, Censys, …) leak millions of ciphertexts** that can be attacked offline.
 | 
			
		||||
 | 
			
		||||
Key findings of the research published by Synacktiv (2024-2025):
 | 
			
		||||
* Dataset July 2024 » 580 k tokens, **3.99 % keys cracked** (≈23 k)
 | 
			
		||||
* Dataset May 2025 » 625 k tokens, **3.56 % keys cracked**
 | 
			
		||||
* >1 000 servers still vulnerable to legacy CVE-2018-15133 because tokens directly contain serialized data.
 | 
			
		||||
* Huge key reuse – the Top-10 APP_KEYs are hard-coded defaults shipped with commercial Laravel templates (UltimatePOS, Invoice Ninja, XPanel, …).
 | 
			
		||||
 | 
			
		||||
The private Go tool **nounours** pushes AES-CBC/GCM bruteforce throughput to ~1.5 billion tries/s, reducing full dataset cracking to <2 minutes.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
## CVE-2024-52301 – HTTP argv/env override → auth bypass
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user