The authentication method in Laravel 8.x through 9.x before 9.32.0 was discovered to be vulnerable to user enumeration via timeless timing attacks with HTTP/2 multiplexing. This is caused by the early return inside the hasValidCredentials method in the Illuminate\Auth\SessionGuard class when a user is found to not exist.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
https://ephort.dk/blog/laravel-timing-attack-vulnerability/ | third party advisory exploit technical description |
https://github.com/ephort/laravel-user-enumeration-demo | third party advisory exploit |
https://github.com/laravel/framework/pull/44069 | patch vendor advisory |
https://github.com/laravel/framework/releases/tag/v9.32.0 | release notes |