CVE-2022-47945
https://notcve.org/view.php?id=CVE-2022-47945
23 Dec 2022 — ThinkPHP Framework before 6.0.14 allows local file inclusion via the lang parameter when the language pack feature is enabled (lang_switch_on=true). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including pearcmd.php. • https://github.com/top-think/framework/commit/c4acb8b4001b98a0078eda25840d33e295a7f099 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2022-44289
https://notcve.org/view.php?id=CVE-2022-44289
06 Dec 2022 — Thinkphp 5.1.41 and 5.0.24 has a code logic error which causes file upload getshell. Thinkphp 5.1.41 y 5.0.24 tiene un error de lógica de código que provoca la carga del archivo getshell. • https://github.com/top-think/framework/issues/2772 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2021-23592 – Deserialization of Untrusted Data
https://notcve.org/view.php?id=CVE-2021-23592
06 May 2022 — The package topthink/framework before 6.0.12 are vulnerable to Deserialization of Untrusted Data due to insecure unserialize method in the Driver class. El paquete topthink/framework versiones anteriores a 6.0.12, es vulnerable a una Deserialización de Datos No Confiables debido al método no seguro unserialize en la clase Driver • https://github.com/top-think/framework/commit/d3b5aeae94bc71bae97977d05cd12c3e0550905c • CWE-502: Deserialization of Untrusted Data •
CVE-2022-25481
https://notcve.org/view.php?id=CVE-2022-25481
20 Mar 2022 — ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php. NOTE: this is disputed by a third party because system environment exposure is an intended feature of the debugging mode. Se ha detectado que ThinkPHP Framework versión v5.0.24, estaba configurado sin el parámetro PATHINFO. Esto permite a atacantes acceder a todos los parámetros del entorno del sistema desde el archivo index.php • https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md • CWE-284: Improper Access Control CWE-668: Exposure of Resource to Wrong Sphere •
CVE-2021-44350
https://notcve.org/view.php?id=CVE-2021-44350
15 Dec 2021 — SQL Injection vulnerability exists in ThinkPHP5 5.0.x <=5.1.22 via the parseOrder function in Builder.php. Se presenta una vulnerabilidad de inyección SQL en ThinkPHP5 versiones 5.0.x anteriores a 5.1.22 incluyéndola, por medio de la función parseOrder en el archivo Builder.php • https://github.com/top-think/framework/issues/2613 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2018-16385
https://notcve.org/view.php?id=CVE-2018-16385
03 Sep 2018 — ThinkPHP before 5.1.23 allows SQL Injection via the public/index/index/test/index query string. ThinkPHP en versiones anteriores a la 5.1.23 permite la inyección SQL mediante la cadena de consulta public/index/index/test/index. • https://exchange.xforce.ibmcloud.com/vulnerabilities/149288 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •