Vulnerabilities > CVE-2018-20062 - Unspecified vulnerability in 5None Nonecms 1.3.0

047910
CVSS 9.8 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
5none
critical
exploit available
metasploit

Summary

An issue was discovered in NoneCms V1.3. thinkphp/library/think/App.php allows remote attackers to execute arbitrary PHP code via crafted use of the filter parameter, as demonstrated by the s=index/\think\Request/input&filter=phpinfo&data=1 query string.

Vulnerable Configurations

Part Description Count
Application
5None
1

Exploit-Db

idEDB-ID:48333
last seen2020-04-16
modified2020-04-16
published2020-04-16
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/48333
titleThinkPHP - Multiple PHP Injection RCEs (Metasploit)

Metasploit

descriptionThis module exploits one of two PHP injection vulnerabilities in the ThinkPHP web framework to execute code as the web user. Versions up to and including 5.0.23 are exploitable, though 5.0.23 is vulnerable to a separate vulnerability. The module will automatically attempt to detect the version of the software. Tested against versions 5.0.20 and 5.0.23 as can be found on Vulhub.
idMSF:EXPLOIT/UNIX/WEBAPP/THINKPHP_RCE
last seen2020-06-14
modified1976-01-01
published1976-01-01
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/unix/webapp/thinkphp_rce.rb
titleThinkPHP Multiple PHP Injection RCEs

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/157218/thinkphp_rce.rb.txt
idPACKETSTORM:157218
last seen2020-04-21
published2020-04-14
reporterwvu
sourcehttps://packetstormsecurity.com/files/157218/ThinkPHP-5.0.23-Remote-Code-Execution.html
titleThinkPHP 5.0.23 Remote Code Execution