ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php. NOTE: this is disputed by a third party because system environment exposure is an intended feature of the debugging mode.
References
Link | Resource |
---|---|
https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md | Exploit Third Party Advisory |
https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md - Exploit, Third Party Advisory |
03 Jul 2024, 01:38
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-284 |
23 Apr 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php. NOTE: this is disputed by a third party because system environment exposure is an intended feature of the debugging mode. |
Information
Published : 2022-03-21 00:15
Updated : 2024-11-21 06:52
NVD link : CVE-2022-25481
Mitre link : CVE-2022-25481
CVE.ORG link : CVE-2022-25481
JSON object : View
Products Affected
thinkphp
- thinkphp