Description
ThinkPHP 5.0.23 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary PHP code by invoking functions through the routing parameter. Attackers can craft requests to the index.php endpoint with malicious function parameters to execute system commands with application privileges.
Problem types
Authorization Bypass Through User-Controlled Key
Product status
5.1.31
Credits
VulnSpy
References
www.exploit-db.com/exploits/45978 (ExploitDB-45978)
thinkphp.cn (Official Product Homepage)
github.com/top-think/framework/ (Product Reference)
www.vulncheck.com/...emote-code-execution-via-invokefunction (VulnCheck Advisory: ThinkPHP 5.0.23 Remote Code Execution via invokefunction)