
Cloud Vulnerability DB
A community-led vulnerabilities database
Laravel 9.1.8, when processing attacker-controlled data for deserialization, allowed potential Remote Code Execution via an unserialize pop chain in __destruct in Illuminate\Broadcasting\PendingBroadcast.php and dispatch($command) in Illuminate\Bus\QueueingDispatcher.php. However, this CVE was later rejected as it was determined not to be a security issue after further investigation by the CNA (NVD).
The vulnerability was initially reported as a deserialization issue in Laravel 9.1.8 that could potentially lead to Remote Code Execution through a specific pop chain involving the __destruct method in PendingBroadcast.php and the dispatch($command) function in QueueingDispatcher.php (NVD).
Initially, the vulnerability was thought to potentially allow Remote Code Execution, which could have led to complete system compromise. However, after further investigation, it was determined not to be a security issue (NVD).
No mitigation was necessary as the reported issue was determined not to be a security vulnerability after further investigation (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."