First published: Tue Dec 06 2022(Updated: )
Thinkphp 5.1.41 and 5.0.24 has a code logic error which causes file upload getshell.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ThinkPHP ThinkPHP | =5.0.24 | |
ThinkPHP ThinkPHP | =5.1.41 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-44289.
The severity rating of CVE-2022-44289 is high.
The vulnerability in Thinkphp 5.1.41 and 5.0.24 allows an attacker to upload files and potentially gain remote code execution.
To fix the code logic error in Thinkphp 5.1.41 and 5.0.24, apply the official patch or update to a version that addresses the vulnerability.
You can find more information about the vulnerability in Thinkphp 5.1.41 and 5.0.24 on the GitHub issue page: https://github.com/top-think/framework/issues/2772.