Описание
An issue was discovered in NoneCms V1.3. thinkphp/library/think/App.php allows remote attackers to execute arbitrary PHP code via crafted use of the filter parameter, as demonstrated by the s=index/\think\Request/input&filter=phpinfo&data=1 query string.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party Advisory
- US Government Resource
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:5none:nonecms:1.3.0:*:*:*:*:*:*:*
EPSS
Процентиль: 100%
0.94307
Критический
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
NVD-CWE-noinfo
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
An issue was discovered in NoneCms V1.3. thinkphp/library/think/App.php allows remote attackers to execute arbitrary PHP code via crafted use of the filter parameter, as demonstrated by the s=index/\think\Request/input&filter=phpinfo&data=1 query string.
CVSS3: 9.8
fstec
около 7 лет назад
Уязвимость компонента thinkphp/library/think/App.php фреймворка ThinkPHP, позволяющая нарушителю выполнить произвольный PHP код в целевой системе
EPSS
Процентиль: 100%
0.94307
Критический
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
NVD-CWE-noinfo