PT-2019-6168 · Thinkphp · Thinkphp

Yang Chenglong

·

Published

2019-01-12

·

Updated

2025-12-09

·

CVE-2019-9082

CVSS v2.0
10
VectorAV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions ThinkPHP versions prior to 3.2.4 Open Source BMS version 1.1.1 zzzcms zzzphp
Description A flaw exists in ThinkPHP related to improper handling of code generation when using backslashes ('') as delimiters in the controller name. This can allow a remote attacker to execute arbitrary commands. The issue involves the
public//?s=index/thinkapp/invokefunction&function=call user func array&vars[0]=system&vars[1][]=
API endpoint, where the
vars[1][]
parameter is used to inject and execute commands. The
call user func array
function is involved in the execution process. This issue has been actively exploited.
Recommendations Versions prior to 3.2.4 should be updated to version 3.2.4 or later. For Open Source BMS version 1.1.1, update to a newer, patched version. For zzzcms and zzzphp, update to a newer, patched version.

Exploit

Fix

Code Injection

Missing Authentication

Weakness Enumeration

Related Identifiers

BDU:2022-01480
CVE-2019-9082

Affected Products

Thinkphp