module
Invoice Ninja unauthenticated PHP Deserialization Vulnerability
Disclosed | Created |
---|---|
12/13/2024 | 02/25/2025 |
Disclosed
12/13/2024
Created
02/25/2025
Description
Invoice Ninja is a free invoicing software for small businesses, based on the PHP framework Laravel.
A Remote Code Execution vulnerability in Invoice Ninja (>= 5.8.22 attackers to conduct PHP deserialization attacks via endpoint `/route/` which accepts a Laravel
ciphered value which is unsafe unserialized, if an attacker has access to the APP_KEY.
As it allows remote code execution, adversaries could exploit this flaw to execute arbitrary commands,
potentially resulting in complete system compromise, data exfiltration, or unauthorized access
to sensitive information.
A Remote Code Execution vulnerability in Invoice Ninja (>= 5.8.22 attackers to conduct PHP deserialization attacks via endpoint `/route/` which accepts a Laravel
ciphered value which is unsafe unserialized, if an attacker has access to the APP_KEY.
As it allows remote code execution, adversaries could exploit this flaw to execute arbitrary commands,
potentially resulting in complete system compromise, data exfiltration, or unauthorized access
to sensitive information.
Authors
h00die-gr3y Rémi MatasseMickaël Benassouli
Platform
Linux,PHP,Unix
Architectures
php, cmd
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:
msf > use exploit/linux/http/invoiceninja_unauth_rce_cve_2024_55555 msf /(5) > show actions ...actions... msf /(5) > set ACTION < action-name > msf /(5) > show options ...show and set options... msf /(5) > run

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.