7 results (0.006 seconds)

CVSS: 10.0EPSS: 7%CPEs: 1EXPL: 1

23 Dec 2022 — ThinkPHP Framework before 6.0.14 allows local file inclusion via the lang parameter when the language pack feature is enabled (lang_switch_on=true). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including pearcmd.php. • https://github.com/top-think/framework/commit/c4acb8b4001b98a0078eda25840d33e295a7f099 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

06 May 2022 — The package topthink/framework before 6.0.12 are vulnerable to Deserialization of Untrusted Data due to insecure unserialize method in the Driver class. El paquete topthink/framework versiones anteriores a 6.0.12, es vulnerable a una Deserialización de Datos No Confiables debido al método no seguro unserialize en la clase Driver • https://github.com/top-think/framework/commit/d3b5aeae94bc71bae97977d05cd12c3e0550905c • CWE-502: Deserialization of Untrusted Data •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

10 Feb 2022 — A Remote Code Execution (RCE) vulnerability exists in ThinkPHP 3.x.x via value[_filename] in index.php, which could let a malicious user obtain server control privileges. Se presenta una vulnerabilidad de ejecución de código remota (RCE) en ThinkPHP versión 3.x.x por medio de la función value[_filename] en el archivo index.php, que podría permitir a un usuario malicioso obtener privilegios de control del servidor • https://github.com/Stakcery/Web-Security/issues/1 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

28 Sep 2021 — ThinkPHP v3.2.3 and below contains a SQL injection vulnerability which is triggered when the array is not passed to the "where" and "query" methods. ThinkPHP versiones v3.2.3 y por debajo, contienen una vulnerabilidad de inyección SQL que es desencadenada cuando no se pasa el array a los métodos "where" y "query" • https://github.com/top-think/thinkphp/issues/553 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.3EPSS: 97%CPEs: 3EXPL: 6

24 Feb 2019 — ThinkPHP before 3.2.4, as used in Open Source BMS v1.1.1 and other products, allows Remote Command Execution via public//?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]= followed by the command. ThinkPHP, en versiones anteriores a la 3.2.4, tal y como se emplea en Open Source BMS v1.1.1 y otros productos, permite la ejecución remota de comandos mediante public//?s=index/\think\app/invokefunctionfunction=call_user_func_arrayvars[0]=systemvars[1][]=, seguido por el co... • https://packetstorm.news/files/id/151967 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-306: Missing Authentication for Critical Function •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

03 Sep 2018 — ThinkPHP before 5.1.23 allows SQL Injection via the public/index/index/test/index query string. ThinkPHP en versiones anteriores a la 5.1.23 permite la inyección SQL mediante la cadena de consulta public/index/index/test/index. • https://exchange.xforce.ibmcloud.com/vulnerabilities/149288 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

19 Apr 2018 — thinkphp 3.1.3 has SQL Injection via the index.php s parameter. thinkphp 3.1.3 tiene una inyección SQL mediante el parámetro s en index.php. • http://www.blcat.cn/post-39.html • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •