Vulnerabilities > CVE-2018-20062 - Unspecified vulnerability in 5None Nonecms 1.3.0
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
An issue was discovered in NoneCms V1.3. thinkphp/library/think/App.php allows remote attackers to execute arbitrary PHP code via crafted use of the filter parameter, as demonstrated by the s=index/\think\Request/input&filter=phpinfo&data=1 query string.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
id | EDB-ID:48333 |
last seen | 2020-04-16 |
modified | 2020-04-16 |
published | 2020-04-16 |
reporter | Exploit-DB |
source | https://www.exploit-db.com/download/48333 |
title | ThinkPHP - Multiple PHP Injection RCEs (Metasploit) |
Metasploit
description | This module exploits one of two PHP injection vulnerabilities in the ThinkPHP web framework to execute code as the web user. Versions up to and including 5.0.23 are exploitable, though 5.0.23 is vulnerable to a separate vulnerability. The module will automatically attempt to detect the version of the software. Tested against versions 5.0.20 and 5.0.23 as can be found on Vulhub. |
id | MSF:EXPLOIT/UNIX/WEBAPP/THINKPHP_RCE |
last seen | 2020-06-14 |
modified | 1976-01-01 |
published | 1976-01-01 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/unix/webapp/thinkphp_rce.rb |
title | ThinkPHP Multiple PHP Injection RCEs |
Packetstorm
data source | https://packetstormsecurity.com/files/download/157218/thinkphp_rce.rb.txt |
id | PACKETSTORM:157218 |
last seen | 2020-04-21 |
published | 2020-04-14 |
reporter | wvu |
source | https://packetstormsecurity.com/files/157218/ThinkPHP-5.0.23-Remote-Code-Execution.html |
title | ThinkPHP 5.0.23 Remote Code Execution |