CAPEC-214
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
CWE-248
HIPAA-164.306(a)
HIPAA-164.308(a)
ISO27001-A.18.1.3
OWASP 2013-A5
OWASP 2017-A6
PCI v3.2-6.5.5
WASC-14

Stack Trace Disclosure (Laravel)

Severity:
Medium
Summary

While analyzing an HTTP response, Invicti identified a stack trace that was exposed by the Laravel framework due to a misconfiguration.

Impact

An attacker can obtain information such as:

  • Function names
  • Filenames
  • Physical file paths of relevant files.
  • Function parameters

This information might help an attacker gain more information and potentially focus on the development of further attacks against the target system.

Remediation

Change your config/app.php file to disable debug mode, which is responsible for the visible stack traces:

'debug' => (bool) env('APP_DEBUG', false)

Required Skills for Successful Exploitation
Actions To Take
Vulnerability Index

You can search and find all vulnerabilities

Featured resources

Blog

Strengthening enterprise application security: Invicti acquires Kondukto

Blog

Modern AppSec KPIs: Moving from scan counts to real risk reduction

Blog

Friends don’t let friends shift left: Shift smarter with DAST-first AppSec

Blog

Vibe talking: Dan Murphy on the promises, pitfalls, and insecurities of vibe coding

Blog

Strengthening enterprise application security: Invicti acquires Kondukto

Blog

Modern AppSec KPIs: Moving from scan counts to real risk reduction

Blog

Friends don’t let friends shift left: Shift smarter with DAST-first AppSec

Blog

Vibe talking: Dan Murphy on the promises, pitfalls, and insecurities of vibe coding