CVE-2022-25481

ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php. NOTE: this is disputed by a third party because system environment exposure is an intended feature of the debugging mode.
Configurations

Configuration 1 (hide)

cpe:2.3:a:thinkphp:thinkphp:5.0.24:*:*:*:*:*:*:*

History

21 Nov 2024, 06:52

Type Values Removed Values Added
References () https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md - Exploit, Third Party Advisory () https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md - Exploit, Third Party Advisory

03 Jul 2024, 01:38

Type Values Removed Values Added
CWE CWE-284

23 Apr 2024, 08:15

Type Values Removed Values Added
Summary (en) ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php. (en) ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php. NOTE: this is disputed by a third party because system environment exposure is an intended feature of the debugging mode.

Information

Published : 2022-03-21 00:15

Updated : 2024-11-21 06:52


NVD link : CVE-2022-25481

Mitre link : CVE-2022-25481

CVE.ORG link : CVE-2022-25481


JSON object : View

Products Affected

thinkphp

  • thinkphp
CWE
CWE-668

Exposure of Resource to Wrong Sphere

CWE-284

Improper Access Control