Enabling Simple Ajax Uploader plugin included in Laragon open-source software allows for a remote code execution (RCE) attack via an improper input validation in a file_upload.php file which serves as an example.
By default, Laragon is not vulnerable until a user decides to use the aforementioned plugin.
References
Link | Resource |
---|---|
https://cert.pl/en/posts/2024/02/CVE-2024-0864 | Third Party Advisory |
https://cert.pl/posts/2024/02/CVE-2024-0864 | Third Party Advisory |
https://laragon.org/ | Product |
https://cert.pl/en/posts/2024/02/CVE-2024-0864 | Third Party Advisory |
https://cert.pl/posts/2024/02/CVE-2024-0864 | Third Party Advisory |
https://laragon.org/ | Product |
Configurations
History
24 Apr 2025, 17:01
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:laragon:laragon:*:*:*:*:*:*:*:* | |
References | () https://cert.pl/en/posts/2024/02/CVE-2024-0864 - Third Party Advisory | |
References | () https://cert.pl/posts/2024/02/CVE-2024-0864 - Third Party Advisory | |
References | () https://laragon.org/ - Product | |
First Time |
Laragon laragon
Laragon |
Information
Published : 2024-02-29 13:15
Updated : 2025-04-24 17:01
NVD link : CVE-2024-0864
Mitre link : CVE-2024-0864
CVE.ORG link : CVE-2024-0864
JSON object : View
Products Affected
laragon
- laragon
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type