44 lines
1.2 KiB
YAML
44 lines
1.2 KiB
YAML
id: CVE-2022-25481
|
|
|
|
info:
|
|
name: ThinkPHP 5.0.24 - Information Disclosure
|
|
author: caon
|
|
severity: high
|
|
description: |
|
|
ThinkPHP 5.0.24 is susceptible to information disclosure. This version was configured without the PATHINFO parameter. This can allow an attacker to access all system environment parameters from index.php, thereby possibly obtaining sensitive information, modifying data, and/or executing unauthorized operations.
|
|
reference:
|
|
- https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2022-25481
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
|
cvss-score: 7.5
|
|
cve-id: CVE-2022-25481
|
|
cwe-id: CWE-668
|
|
metadata:
|
|
shodan-query: title:"ThinkPHP"
|
|
verified: "true"
|
|
tags: cve,cve2022,thinkphp,exposure,oss
|
|
|
|
requests:
|
|
- method: GET
|
|
path:
|
|
- '{{BaseURL}}/index.php?s=example'
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
words:
|
|
- "ThinkPHP"
|
|
|
|
- type: word
|
|
words:
|
|
- "HttpException"
|
|
- "TRACE"
|
|
condition: or
|
|
|
|
- type: status
|
|
status:
|
|
- 404
|
|
|
|
# Enhanced by md on 2023/02/03
|