Skip to content

Commit 9df6b0d

Browse files
authored
Update laravel.md
1 parent 591481a commit 9df6b0d

1 file changed

Lines changed: 12 additions & 1 deletion

File tree

  • src/network-services-pentesting/pentesting-web

src/network-services-pentesting/pentesting-web/laravel.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,18 @@ curl -H "Cookie: laravel_session=<orig>; <cookie_name>=$(cat forged.txt)" https:
8989
```
9090

9191

92-
---
92+
## Mass APP_KEY discovery via cookie brute-force
93+
94+
Because every fresh Laravel response sets at least 1 encrypted cookie (`XSRF-TOKEN` and usually `laravel_session`), **public internet scanners (Shodan, Censys, …) leak millions of ciphertexts** that can be attacked offline.
95+
96+
Key findings of the research published by Synacktiv (2024-2025):
97+
* Dataset July 2024 » 580 k tokens, **3.99 % keys cracked** (≈23 k)
98+
* Dataset May 2025 » 625 k tokens, **3.56 % keys cracked**
99+
* >1 000 servers still vulnerable to legacy CVE-2018-15133 because tokens directly contain serialized data.
100+
* Huge key reuse – the Top-10 APP_KEYs are hard-coded defaults shipped with commercial Laravel templates (UltimatePOS, Invoice Ninja, XPanel, …).
101+
102+
The private Go tool **nounours** pushes AES-CBC/GCM bruteforce throughput to ~1.5 billion tries/s, reducing full dataset cracking to <2 minutes.
103+
93104

94105
## CVE-2024-52301 – HTTP argv/env override → auth bypass
95106

0 commit comments

Comments
 (0)