nomisec
WORKING POC
285 stars
by ambionics · poc
https://github.com/ambionics/laravel-exploits
This repository contains a functional exploit for CVE-2021-3129, a Laravel Ignition RCE vulnerability. The exploit leverages deserialization via PHAR files and log file manipulation to achieve remote code execution on vulnerable Laravel applications.
Classification
Working Poc 100%
Target:
Laravel Ignition <= 2.5.1
No auth needed
Prerequisites:
Laravel application with Ignition debug mode enabled · Access to the target URL · PHPGGC tool to generate the PHAR payload
nomisec
WORKING POC
161 stars
by zhzyker · remote
https://github.com/zhzyker/CVE-2021-3129
This repository contains a functional exploit for CVE-2021-3129, a Laravel Ignition RCE vulnerability. It includes multiple gadget chains for different frameworks (Laravel, Monolog, etc.) and a Python script to automate the exploitation process.
Classification
Working Poc 95%
Target:
Laravel Ignition (versions affected by CVE-2021-3129)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Laravel Ignition · PHP environment with phar.readonly=0
nomisec
WORKING POC
131 stars
by SNCKER · remote
https://github.com/SNCKER/CVE-2021-3129
This repository contains a functional exploit for CVE-2021-3129, a Laravel debug mode RCE vulnerability. It includes a Docker environment for replication and an exploit script that leverages PHP deserialization via phar files and Laravel's Ignition debug tool.
Classification
Working Poc 95%
Target:
Laravel with Ignition debug tool (version 2.5.1)
No auth needed
Prerequisites:
Laravel application with debug mode enabled · Ignition debug tool version 2.5.1 · PHP phar.readonly disabled
nomisec
WORKING POC
131 stars
by joshuavanderpoll · remote
https://github.com/joshuavanderpoll/CVE-2021-3129
This repository contains a functional exploit for CVE-2021-3129, targeting Laravel applications with deserialization vulnerabilities. The script includes multiple exploit chains for RCE and provides automated testing via Docker.
Classification
Working Poc 95%
Target:
Laravel (versions affected by CVE-2021-3129)
No auth needed
Prerequisites:
Vulnerable Laravel application · Network access to the target
nomisec
WORKING POC
77 stars
by SecPros-Team · remote
https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP
This repository contains a functional exploit for CVE-2021-3129, targeting Laravel's Ignition component. The exploit leverages a deserialization vulnerability to achieve remote code execution by manipulating the 'solution' and 'parameters' fields in a POST request.
Classification
Working Poc 95%
Target:
Laravel with Ignition component
No auth needed
Prerequisites:
Target must be running a vulnerable version of Laravel with Ignition enabled
nomisec
WORKING POC
68 stars
by nth347 · remote
https://github.com/nth347/CVE-2021-3129_exploit
This repository contains a functional exploit for CVE-2021-3129, a Laravel Ignition RCE vulnerability. The exploit leverages PHAR deserialization via log file manipulation to achieve remote code execution.
Classification
Working Poc 100%
Target:
Laravel with Ignition 2.5.1
No auth needed
Prerequisites:
PHPGGC tool for payload generation · Laravel application with vulnerable Ignition version
nomisec
WORKING POC
18 stars
by crisprss · remote
https://github.com/crisprss/Laravel_CVE-2021-3129_EXP
This repository contains a functional exploit for CVE-2021-3129, a Laravel Ignition deserialization vulnerability leading to RCE. The PoC leverages PHP gadget chains (Monolog RCE5) and phar deserialization to execute arbitrary commands on vulnerable Laravel installations.
Classification
Working Poc 95%
Target:
Laravel Ignition 2.5.1 (Laravel 8.4.2)
No auth needed
Prerequisites:
PHPGGCC tool for gadget chain generation · Laravel Ignition 2.5.1 installed
nomisec
WORKING POC
13 stars
by ajisai-babu · remote
https://github.com/ajisai-babu/CVE-2021-3129-exp
This repository contains a functional exploit for CVE-2021-3129, targeting Laravel Debug mode RCE. The script automates the exploitation process, including vulnerability detection and payload delivery to achieve remote code execution.
Classification
Working Poc 95%
Target:
Laravel (Debug mode enabled)
No auth needed
Prerequisites:
Laravel application with Debug mode enabled · Access to the target URL
nomisec
WORKING POC
12 stars
by knqyf263 · poc
https://github.com/knqyf263/CVE-2021-3129
This repository contains a functional exploit for CVE-2021-3129, a Laravel deserialization vulnerability leading to RCE. It includes a Dockerized environment for both victim and attacker, with a Python script that automates the exploitation process using PHPGGC gadget chains.
Classification
Working Poc 100%
Target:
Laravel with Ignition 2.5.1
No auth needed
Prerequisites:
Laravel application with vulnerable Ignition version · Access to the target's _ignition/execute-solution endpoint
nomisec
WORKING POC
9 stars
by 0x0d3ad · remote
https://github.com/0x0d3ad/CVE-2021-3129
This repository contains a functional exploit for CVE-2021-3129, a Laravel Ignition RCE vulnerability. The exploit automates PHAR deserialization via log poisoning, leveraging phpggc for payload generation and executing arbitrary commands on vulnerable Laravel applications.
Classification
Working Poc 100%
Target:
Laravel with Ignition package
No auth needed
Prerequisites:
PHP installed on attacker's system · phpggc tool for payload generation · Vulnerable Laravel application with Ignition package
nomisec
WORKING POC
8 stars
by cuongtop4598 · remote
https://github.com/cuongtop4598/CVE-2021-3129-Script
This repository contains a functional exploit for CVE-2021-3129, targeting Laravel's Ignition component via deserialization. It includes multiple gadget chains for RCE and a Python script to automate the exploitation process.
Classification
Working Poc 95%
Target:
Laravel Ignition (versions affected by CVE-2021-3129)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Laravel Ignition · PHP environment with phar.readonly=0
nomisec
SCANNER
7 stars
by MadExploits · poc
https://github.com/MadExploits/Laravel-debug-Checker
This repository contains a Python-based scanner for detecting CVE-2021-3129, a Laravel debug mode vulnerability. It checks for the presence of the '/_ignition/health-check' endpoint and verifies if command execution is enabled.
Classification
Scanner 100%
Target:
Laravel (debug mode enabled)
No auth needed
Prerequisites:
Target must have Laravel debug mode enabled · Access to the '/_ignition/health-check' endpoint
nomisec
WORKING POC
6 stars
by shadowabi · remote
https://github.com/shadowabi/Laravel-CVE-2021-3129
This repository contains a functional exploit for CVE-2021-3129, targeting Laravel's Ignition component via deserialization. It includes multiple gadget chains for RCE and a Python script to automate the exploitation process.
Classification
Working Poc 95%
Target:
Laravel (Ignition component)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Laravel with Ignition enabled · PHP deserialization must be possible
nomisec
WORKING POC
6 stars
by 0nion1 · remote
https://github.com/0nion1/CVE-2021-3129
This repository contains a functional exploit for CVE-2021-3129, targeting Laravel applications with debug mode enabled. The exploit leverages deserialization via PHAR files and Laravel Ignition's debug endpoint to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
Laravel (with debug mode enabled)
No auth needed
Prerequisites:
Debug mode enabled in Laravel · Access to Laravel Ignition endpoints
nomisec
WORKING POC
5 stars
by Axianke · remote
https://github.com/Axianke/CVE-2021-3129
This repository contains a functional exploit for CVE-2021-3129, a Laravel deserialization vulnerability. The exploit leverages PHPGGC gadget chains to achieve remote code execution (RCE) by manipulating Laravel's Ignition error page and log file handling.
Classification
Working Poc 95%
Target:
Laravel (with Ignition error page)
No auth needed
Prerequisites:
PHP environment · PHPGGC tool · Laravel application with Ignition error page enabled
nomisec
WORKING POC
2 stars
by wmasday · remote
https://github.com/wmasday/CVE-2021-3129
This repository contains a functional exploit for CVE-2021-3129, targeting Laravel <= 8.4.2 in debug mode. The exploit leverages deserialization via PHPGGC chains to achieve remote code execution (RCE) by manipulating Laravel's Ignition debug interface.
Classification
Working Poc 95%
Target:
Laravel <= 8.4.2 (debug mode)
No auth needed
Prerequisites:
Target must have Laravel debug mode enabled · Target must be running Laravel <= 8.4.2 · PHPGGC tool must be available for payload generation
nomisec
WORKING POC
2 stars
by FunPhishing · remote
https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129
This repository contains a functional exploit for CVE-2021-3129, a Laravel deserialization vulnerability leading to RCE. The exploit uses phpggc gadget chains to generate malicious payloads and leverages Laravel's Ignition debug mode to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Laravel 8.4.2 with Ignition debug mode
No auth needed
Prerequisites:
Laravel debug mode enabled · phpggc installed · PHP phar.readonly disabled
nomisec
WORKING POC
1 stars
by idea-oss · poc
https://github.com/idea-oss/laravel-CVE-2021-3129-EXP
This repository contains a functional exploit for CVE-2021-3129, targeting Laravel applications. The exploit leverages a deserialization vulnerability in the Ignition component to achieve remote code execution (RCE) by writing malicious payloads to log files.
Classification
Working Poc 95%
Target:
Laravel with Ignition component
No auth needed
Prerequisites:
Target must be running a vulnerable version of Laravel with Ignition enabled · Access to the target's error page endpoint
nomisec
WORKING POC
1 stars
by keyuan15 · remote
https://github.com/keyuan15/CVE-2021-3129
This repository contains a functional exploit for CVE-2021-3129, targeting Laravel's Ignition component via deserialization. The PoC leverages PHPGGC to generate gadget chains for RCE, using phar deserialization and log file manipulation.
Classification
Working Poc 95%
Target:
Laravel Ignition (versions affected by CVE-2021-3129)
No auth needed
Prerequisites:
PHP environment with phar.readonly=0 · Laravel application with vulnerable Ignition version
nomisec
WORKING POC
1 stars
by JacobEbben · remote
https://github.com/JacobEbben/CVE-2021-3129
This repository contains a functional exploit for CVE-2021-3129, an unauthenticated RCE vulnerability in Laravel <8.4.2 when debug mode is enabled. The exploit leverages deserialization via PHPGGC to achieve remote command execution.
Classification
Working Poc 95%
Target:
Laravel <8.4.2
No auth needed
Prerequisites:
Laravel in debug mode · PHPGGC tool for payload generation
nomisec
WORKING POC
by piperpwn · remote
https://github.com/piperpwn/CVE-2021-3129-piperpwn
This repository contains a functional exploit for CVE-2021-3129, targeting Laravel's Ignition component via deserialization. The exploit generates PHAR-based gadget chains to achieve remote code execution (RCE) by leveraging Laravel's debug mode and log file manipulation.
Classification
Working Poc 95%
Target:
Laravel Ignition (versions affected by CVE-2021-3129)
No auth needed
Prerequisites:
Target must have Laravel Ignition installed and debug mode enabled · PHP's phar.readonly setting must be disabled or bypassable
nomisec
WORKING POC
by Prabesh01 · poc
https://github.com/Prabesh01/hoh4
This repository contains a functional exploit for CVE-2021-3129, targeting Laravel Ignition's deserialization vulnerability. The exploit leverages PHP's phar deserialization to achieve remote code execution (RCE) by manipulating log files and using PHP filters.
Classification
Working Poc 95%
Target:
Laravel Ignition (versions affected by CVE-2021-3129)
No auth needed
Prerequisites:
Target must have Laravel Ignition installed and vulnerable · PHP's phar.readonly must be disabled or bypassable
nomisec
SCANNER
by banyaksepuh · poc
https://github.com/banyaksepuh/Mass-CVE-2021-3129-Scanner
This repository contains a bash script that scans for CVE-2021-3129, a Laravel Debug RCE vulnerability, by checking for the presence of the '/_ignition/execute-solution' endpoint. It does not exploit the vulnerability but detects potentially vulnerable targets.
Classification
Scanner 95%
Target:
Laravel Debug Mode (versions affected by CVE-2021-3129)
No auth needed
Prerequisites:
List of target URLs in a text file
nomisec
WORKING POC
by miko550 · remote
https://github.com/miko550/CVE-2021-3129
This repository contains a functional exploit for CVE-2021-3129, a Laravel RCE vulnerability. The exploit leverages deserialization via PHPGGC gadget chains to achieve remote code execution on vulnerable Laravel applications.
Classification
Working Poc 95%
Target:
Laravel (versions affected by CVE-2021-3129)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Laravel · PHPGGC tool for generating payloads
nomisec
WORKING POC
by cc3305 · remote
https://github.com/cc3305/CVE-2021-3129
This repository contains a functional exploit for CVE-2021-3129, a Laravel Ignition RCE vulnerability. The script automates the exploitation process by generating PHP gadget chains, triggering errors, and executing arbitrary commands via deserialization.
Classification
Working Poc 95%
Target:
Laravel Ignition (versions affected by CVE-2021-3129)
No auth needed
Prerequisites:
Target must be running vulnerable Laravel Ignition · PHP and phpggc must be installed locally for payload generation
nomisec
WORKING POC
by Y0s9 · poc
https://github.com/Y0s9/CVE-2021-3129
This repository contains a functional exploit for CVE-2021-3129, a Laravel Debug mode RCE vulnerability. The exploit leverages PHP deserialization via phar files and Monolog gadget chains to achieve remote code execution.
Classification
Working Poc 95%
Target:
Laravel <= 8.4.2 with Ignition < 2.5.2
No auth needed
Prerequisites:
Target must have Laravel Debug mode enabled · PHPGGG tool for gadget chain generation
nomisec
WORKING POC
by Zoo1sondv · remote
https://github.com/Zoo1sondv/CVE-2021-3129
This repository contains a functional exploit for CVE-2021-3129, targeting Laravel's Ignition debug mode. The exploit leverages deserialization via PHAR files and includes multiple gadget chains for different frameworks (e.g., Laravel, Monolog, CodeIgniter4).
Classification
Working Poc 95%
Target:
Laravel with Ignition debug mode (versions with CVE-2021-3129)
No auth needed
Prerequisites:
Target must have Laravel Ignition debug mode enabled · PHAR file handling must be allowed
nomisec
WORKING POC
by lukwagoasuman · remote
https://github.com/lukwagoasuman/CVE-2021-3129---Laravel-RCE
This repository contains a functional exploit for CVE-2021-3129, a Laravel RCE vulnerability. The script provides an interactive shell to execute commands, clear logs, and patch the vulnerability on the target system.
Classification
Working Poc 95%
Target:
Laravel (versions affected by CVE-2021-3129)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Laravel · Network access to the target
nomisec
SCANNER
by GodOfServer · infoleak
https://github.com/GodOfServer/CVE-2021-3129
This repository contains a multi-threaded scanner for detecting Laravel applications vulnerable to CVE-2021-3129 by checking for specific paths and error responses. It does not include exploit code but identifies potentially vulnerable targets.
Classification
Scanner 95%
Target:
Laravel (versions affected by CVE-2021-3129)
No auth needed
Prerequisites:
List of target domains
nomisec
WORKING POC
by hupe1980 · remote
https://github.com/hupe1980/CVE-2021-3129
This repository contains a functional exploit for CVE-2021-3129, which targets Laravel's debug mode to achieve remote code execution (RCE) via PHAR deserialization. The exploit leverages Laravel Ignition's vulnerability to write malicious PHAR files to the log directory and trigger their deserialization.
Classification
Working Poc 100%
Target:
Laravel (Ignition <= 2.5.1)
No auth needed
Prerequisites:
Laravel debug mode enabled · Access to the target's /_ignition/execute-solution endpoint · Write access to the log directory
exploitdb
WORKING POC
by SunCSR Team · pythonwebappsphp
https://www.exploit-db.com/exploits/49424
This exploit leverages Laravel's debug mode to achieve remote code execution by manipulating log files through deserialization and PHP filter chains. It uses phpggc to generate a malicious payload and exploits the Ignition component's vulnerability.
Classification
Working Poc 95%
Target:
Laravel <= 8.4.2
No auth needed
Prerequisites:
Laravel debug mode enabled · Write access to log files · PHP phar extension enabled