Vulnerabilities
Vulnerable Software
Thinkphp:  >> Thinkphp  >> 5.0.24  Security Vulnerabilities
ThinkPHP Framework before 6.0.14 allows local file inclusion via the lang parameter when the language pack feature is enabled (lang_switch_on=true). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including pearcmd.php.
CVSS Score
9.8
EPSS Score
0.885
Published
2022-12-23
Thinkphp 5.1.41 and 5.0.24 has a code logic error which causes file upload getshell.
CVSS Score
8.8
EPSS Score
0.001
Published
2022-12-06
The package topthink/framework before 6.0.12 are vulnerable to Deserialization of Untrusted Data due to insecure unserialize method in the Driver class.
CVSS Score
7.7
EPSS Score
0.01
Published
2022-05-06
ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php. NOTE: this is disputed by a third party because system environment exposure is an intended feature of the debugging mode.
CVSS Score
7.5
EPSS Score
0.44
Published
2022-03-21
SQL Injection vulnerability exists in ThinkPHP5 5.0.x <=5.1.22 via the parseOrder function in Builder.php.
CVSS Score
9.8
EPSS Score
0.01
Published
2021-12-15
ThinkPHP before 5.1.23 allows SQL Injection via the public/index/index/test/index query string.
CVSS Score
9.8
EPSS Score
0.005
Published
2018-09-03


Contact Us

Shodan ® - All rights reserved