Code Injection in ThinkPHP5 Framework - #VU16655
Published: December 22, 2018
ThinkPHP5 Framework
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary PHP code on the target system.
The vulnerability exists due to improper input validation in "/index.php" script when processing data passed via the "vars[1][]" HTTP GET parameter. A remote attacker can send a specially crafted request to the vulnerable application and execute arbitrary PHP code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Note: this vulnerability is being actively exploited in the wild in December 2018.