An issue was discovered in NoneCms V1.3. thinkphp/library...
Critical severity Unreviewed PublishedMay 13, 2022 to the GitHub Advisory Database • UpdatedFeb 1, 2023
Description
An issue was discovered in NoneCms V1.3. thinkphp/library/think/App.php allows remote attackers to execute arbitrary PHP code via crafted use of the filter parameter, as demonstrated by the s=index/\think\Request/input&filter=phpinfo&data=1 query string.
References
Published by theNational Vulnerability DatabaseDec 11, 2018
Published to the GitHub Advisory DatabaseMay 13, 2022
Last updatedFeb 1, 2023
Severity
Critical / 10
CVSS v3 base metrics
Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS score
(100th percentile)
Weaknesses
CVE ID
CVE-2018-20062
GHSA ID
GHSA-gf7c-4w4p-7cm5
Source code
No known source code
Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.
LoadingChecking history
See something to contribute?Suggest improvements for this vulnerability.