First published: Sun Feb 24 2019(Updated: )
ThinkPHP before 3.2.4, as used in Open Source BMS v1.1.1 and other products, allows Remote Command Execution via public//?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]= followed by the command.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ThinkPHP ThinkPHP | <3.2.4 | |
Opensourcebms Open Source Background Management System | =1.1.1 | |
ZZZCMS zzzphp | =1.6.1 | |
ThinkPHP ThinkPHP | ||
<3.2.4 | ||
=1.1.1 | ||
=1.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9082 is a remote code execution vulnerability in ThinkPHP before version 3.2.4, which can be exploited to execute remote commands.
CVE-2019-9082 has a severity score of 8.8, which is classified as critical.
ThinkPHP before version 3.2.4, Open Source BMS v1.1.1, and ZZZCMS zzzphp 1.6.1 are affected by CVE-2019-9082.
CVE-2019-9082 can be exploited by sending a specially crafted request to the affected software's public//?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]= endpoint.
Yes, there are known exploits of CVE-2019-9082 available at the following references: [1] [2] [3].