CVE-2024-55556

CRITICAL NUCLEI

Crater Invoice - Code Injection

Title source: llm
STIX 2.1

Description

A vulnerability in Crater Invoice allows an unauthenticated attacker with knowledge of the APP_KEY to achieve remote command execution on the server by manipulating the laravel_session cookie, exploiting arbitrary deserialization through the encrypted session data. The exploitation vector of this vulnerability relies on an attacker obtaining Laravel's secret APP_KEY, which would allow them to decrypt and manipulate session cookies (laravel_session) containing serialized data. By altering this data and re-encrypting it with the APP_KEY, the attacker could trigger arbitrary deserialization on the server, potentially leading to remote command execution (RCE). The vulnerability is primarily exploited by accessing an exposed cookie and manipulating it using the secret key to gain malicious access to the server.

Exploits (1)

metasploit WORKING POC EXCELLENT
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/invoiceshelf_unauth_rce_cve_2024_55556.rb

Nuclei Templates (1)

InvoiceShelf <= 1.3.0 - PHP Deserialization
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: http.title:"InvoiceShelf"
FOFA: title="InvoiceShelf"

Scores

CVSS v3 9.8
EPSS 0.8468
EPSS Percentile 99.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-502
Status published
Published Jan 07, 2025
Tracked Since Feb 18, 2026