#VU16655 Code Injection in ThinkPHP5 Framework
Published: December 22, 2018
ThinkPHP5 Framework
ThinkPHP
Description
The vulnerability allows a remote attacker to execute arbitrary PHP code on the target system.
The vulnerability exists due to improper input validation in "/index.php" script when processing data passed via the "vars[1][]" HTTP GET parameter. A remote attacker can send a specially crafted request to the vulnerable application and execute arbitrary PHP code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Note: this vulnerability is being actively exploited in the wild in December 2018.