First published: Fri Oct 19 2018(Updated: )
ThinkPHP 3.2.4 has SQL Injection via the count parameter because the `Library/Think/Db/Driver/Mysql.class.php` `parseKey` function mishandles the key variable. NOTE: a backquote character is not required in the attack URI.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/topthink/framework | <=3.2.4 | |
ThinkPHP ThinkPHP | =3.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-18529 is critical with a CVSS score of 9.8.
ThinkPHP 3.2.4 has SQL Injection vulnerability through the count parameter due to mishandling of the key variable in the parseKey function of Mysql.class.php.
The affected software version of CVE-2018-18529 is ThinkPHP 3.2.4.
It is recommended to update ThinkPHP to a version that has patched the SQL Injection vulnerability.
More information about CVE-2018-18529 can be found at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2018-18529), [Kingkk.com](https://www.kingkk.com/2018/10/Thinkphp-%E8%81%9A%E5%90%88%E6%9F%A5%E8%AF%A2%E6%BC%8F%E6%B4%9E/#ThinkPHP3-lt-3-2-4), [GitHub Advisory](https://github.com/advisories/GHSA-78q9-24gv-g288).