CVE-2017-16894
HIGH EXPLOITED NUCLEILaravel <5.5.21 - Information Disclosure
Title source: nucleiDescription
In Laravel framework through 5.5.21, remote attackers can obtain sensitive information (such as externally usable passwords) via a direct request for the /.env URI. NOTE: this CVE is only about Laravel framework's writeNewEnvironmentFileWith function in src/Illuminate/Foundation/Console/KeyGenerateCommand.php, which uses file_put_contents without restricting the .env permissions. The .env filename is not used exclusively by Laravel framework.
Exploits (3)
metasploit
WORKING POC
EXCELLENT
by Ståle Pettersen, aushack · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/laravel_token_unserialize_exec.rb
Nuclei Templates (1)
Laravel <5.5.21 - Information Disclosure
HIGHVERIFIEDby j4vaovo
Shodan:
Laravel-Framework || cpe:"cpe:2.3:a:laravel:laravel" || laravel-framework
FOFA:
app="Laravel-Framework" || app="laravel-framework"
References (3)
Scores
CVSS v3
7.5
EPSS
0.8879
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Exploitation Intel
VulnCheck KEV
2025-04-29
Classification
CWE
CWE-200
Status
draft
Affected Products (1)
laravel/laravel
< 5.5.21
Timeline
Published
Nov 20, 2017
Tracked Since
Feb 18, 2026