Laravel Media Library Pro versions 2.1.6 and below as well as 1.17.10 and below suffer from a remote shell upload vulnerability.
6d8f2553e3fe9002ec60d7e3a9741740a148f8cf1da6fb3d7263cf99278e8f1e
# Exploit Title: Laravel Media Library Pro <=2.1.6 - Arbitrary File Upload (Unauthenticated)
# Google Dork: -
# Date: Mar 13, 2022
# Exploit Author: Kelvin Yip <kelvin@cybersecthreat.com>
# Vendor Homepage: https://spatie.be/
# Software Link: https://spatie.be/products/media-library-pro
# Version: <=1.17.10 & <=2.1.6
# Tested on: Laradock (PHP 8.0) inside Ubuntu 20.04
# CVE : CVE-2021-45040
#######################################################################################################
Description:
The Spatie media-library-pro library through 1.17.10 & 2.1.6 for Laravel allows remote attackers to upload executable files via the uploads route.
#######################################################################################################
Xploit : Arbitrary File Upload (Unauthenticated)
Default URL: http://server/api/media-library-pro/uploads OR http://server/media-library-pro/uploads
Note: The URL can be changed by developer.
Upload a PHP webshell or shell file with 3 parameters: (uuid, name and file), the JSON response will contain “original_url”, access the URL in the browser to get the shell access.
#######################################################################################################
Additional Information for setup, test and solutions: https://cybersecthreat.com/2022/03/14/cve-2021-45040/
#######################################################################################################