2022-11-24 16:42:41 +00:00
id : CVE-2022-25481
info :
name : ThinkPHP 5.0.24 - Information Disclosure
author : caon
2022-11-25 09:59:03 +00:00
severity : high
2022-11-24 18:21:41 +00:00
description : |
2023-02-03 16:18:38 +00:00
ThinkPHP 5.0.24 is susceptible to information disclosure. This version was configured without the PATHINFO parameter. This can allow an attacker to access all system environment parameters from index.php, thereby possibly obtaining sensitive information, modifying data, and/or executing unauthorized operations.
2022-11-24 18:21:41 +00:00
reference :
- https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md
- https://nvd.nist.gov/vuln/detail/CVE-2022-25481
2022-11-25 09:59:03 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score : 7.5
cve-id : CVE-2022-25481
cwe-id : CWE-668
2023-04-12 10:55:48 +00:00
cpe : cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:*
epss-score : 0.0072
2022-11-24 18:21:41 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 1
2022-11-24 18:21:41 +00:00
shodan-query : title:"ThinkPHP"
2023-06-04 08:13:42 +00:00
verified : true
2022-11-25 07:38:40 +00:00
tags : cve,cve2022,thinkphp,exposure,oss
2022-11-24 16:42:41 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-11-24 16:42:41 +00:00
- method : GET
path :
- '{{BaseURL}}/index.php?s=example'
matchers-condition : and
matchers :
- type : word
words :
- "ThinkPHP"
2022-11-24 18:21:41 +00:00
- type : word
words :
- "HttpException"
- "TRACE"
condition : or
2022-11-24 16:42:41 +00:00
- type : status
status :
- 404
2023-02-03 16:15:18 +00:00
# Enhanced by md on 2023/02/03