First published: Fri Dec 23 2022(Updated: )
ThinkPHP Framework before 6.0.14 allows local file inclusion via the lang parameter when the language pack feature is enabled (`lang_switch_on=true`). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including `pearcmd.php`.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ThinkPHP ThinkPHP | <6.0.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-47945 is a vulnerability in the ThinkPHP Framework before version 6.0.14 that allows for local file inclusion and arbitrary command execution.
CVE-2022-47945 has a severity rating of 9.8 (critical).
CVE-2022-47945 can be exploited by an unauthenticated remote attacker by using the lang parameter with the language pack feature enabled, allowing them to execute arbitrary operating system commands.
ThinkPHP Framework versions before 6.0.14 are affected by CVE-2022-47945.
To fix CVE-2022-47945, it is recommended to update to ThinkPHP Framework version 6.0.14 or higher.