ThinkPHP Framework before 6.0.14 allows local file inclusion via the lang parameter when the language pack feature is enabled (lang_switch_on=true). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including pearcmd.php.
References
Link | Resource |
---|---|
https://github.com/top-think/framework/compare/v6.0.13...v6.0.14 | Patch Third Party Advisory |
https://github.com/top-think/framework/commit/c4acb8b4001b98a0078eda25840d33e295a7f099 | Patch Third Party Advisory |
https://tttang.com/archive/1865/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2022-12-23 13:15
Updated : 2022-12-30 14:15
NVD link : CVE-2022-47945
Mitre link : CVE-2022-47945
JSON object : View
CWE
Products Affected
thinkphp
- thinkphp