First published: Mon Dec 06 2021(Updated: )
ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component vendor\league\flysystem-cached-adapter\src\Storage\Adapter.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/topthink/framework | <6.0.9 | 6.0.9 |
ThinkPHP ThinkPHP | =6.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36564 has been classified with a moderate severity due to its deserialization vulnerability.
To mitigate CVE-2021-36564, you should upgrade ThinkPHP from version 6.0.8 to at least 6.0.9.
The vulnerability could allow attackers to exploit deserialization issues, potentially leading to remote code execution.
CVE-2021-36564 affects ThinkPHP version 6.0.8.
While not extremely common, deserialization vulnerabilities like CVE-2021-36564 are recognized as significant security risks in web applications.