First published: Tue Dec 11 2018(Updated: )
An issue was discovered in NoneCms V1.3. thinkphp/library/think/App.php allows remote attackers to execute arbitrary PHP code via crafted use of the filter parameter, as demonstrated by the s=index/\think\Request/input&filter=phpinfo&data=1 query string.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
5none Nonecms | =1.3.0 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-20062 is critical with a CVSS score of 9.8.
The affected software for CVE-2018-20062 is ThinkPHP noneCms version 1.3.0.
CVE-2018-20062 allows remote attackers to execute arbitrary PHP code through crafted use of the filter parameter in thinkphp/library/think/App.php.
At this time, there is no known fix for CVE-2018-20062. It is recommended to upgrade to a patched version or apply any available security patches.
Yes, you can find more information on CVE-2018-20062 at the following references: [Link 1](http://packetstormsecurity.com/files/157218/ThinkPHP-5.0.23-Remote-Code-Execution.html) and [Link 2](https://github.com/nangge/noneCms/issues/21).