Exposed Dangerous Method or Function Affecting orchid/platform package, versions >=8.0, <14.43.0
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-ORCHIDPLATFORM-8366559
- published 12 Nov 2024
- disclosed 11 Nov 2024
- credit Vladislav Gladky
Introduced: 11 Nov 2024
New CVE-2024-51992 Open this link in a new tabHow to fix?
Upgrade orchid/platform
to version 14.43.0 or higher.
Overview
orchid/platform is a Platform for back-office applications, admin panel or CMS your Laravel app.
Affected versions of this package are vulnerable to Exposed Dangerous Method or Function in the asynchronous modal functionality via the Screen
class. An attacker can call arbitrary methods leading to potential brute force of database tables, validation checks against user credentials, and disclosure of the server's IP address by exploiting the method exposure issue.
Workaround
This vulnerability can be mitigated by implementing middleware to intercept and validate requests to asynchronous modal endpoints, allowing only approved methods and parameters.