CVE-2018-20062

An issue was discovered in NoneCms V1.3. thinkphp/library/think/App.php allows remote attackers to execute arbitrary PHP code via crafted use of the filter parameter, as demonstrated by the s=index/\think\Request/input&filter=phpinfo&data=1 query string.
Configurations

Configuration 1 (hide)

cpe:2.3:a:5none:nonecms:1.3.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:00

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/157218/ThinkPHP-5.0.23-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/157218/ThinkPHP-5.0.23-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/nangge/noneCms/issues/21 - Exploit, Third Party Advisory () https://github.com/nangge/noneCms/issues/21 - Exploit, Third Party Advisory

25 Jul 2024, 14:56

Type Values Removed Values Added
CWE CWE-20 NVD-CWE-noinfo
References () http://packetstormsecurity.com/files/157218/ThinkPHP-5.0.23-Remote-Code-Execution.html - () http://packetstormsecurity.com/files/157218/ThinkPHP-5.0.23-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2018-12-11 18:29

Updated : 2024-11-21 04:00


NVD link : CVE-2018-20062

Mitre link : CVE-2018-20062

CVE.ORG link : CVE-2018-20062


JSON object : View

Products Affected

5none

  • nonecms