Enabling Simple Ajax Uploader plugin included in Laragon open-source software allows for a remote code execution (RCE) attack via an improper input validation in a file_upload.php file which serves as an example.
By default, Laragon is not vulnerable until a user decides to use the aforementioned plugin.
References
| Link | Resource |
|---|---|
| https://cert.pl/en/posts/2024/02/CVE-2024-0864 | Third Party Advisory |
| https://cert.pl/posts/2024/02/CVE-2024-0864 | Third Party Advisory |
| https://laragon.org/ | Product |
| https://cert.pl/en/posts/2024/02/CVE-2024-0864 | Third Party Advisory |
| https://cert.pl/posts/2024/02/CVE-2024-0864 | Third Party Advisory |
| https://laragon.org/ | Product |
Configurations
History
No history.
Information
Published : 2024-02-29 13:15
Updated : 2025-04-24 17:01
NVD link : CVE-2024-0864
Mitre link : CVE-2024-0864
CVE.ORG link : CVE-2024-0864
JSON object : View
Products Affected
laragon
- laragon
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
