2024-05-26 14:27:05 +02:00
### [CVE-2019-9082](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9082)



### Description
ThinkPHP before 3.2.4, as used in Open Source BMS v1.1.1 and other products, allows Remote Command Execution via public//?s=index/\think\app/invokefunction& function=call_user_func_array& vars[0]=system& vars[1][]= followed by the command.
### POC
#### Reference
- http://packetstormsecurity.com/files/157218/ThinkPHP-5.0.23-Remote-Code-Execution.html
2024-06-09 00:33:16 +00:00
- http://packetstormsecurity.com/files/157218/ThinkPHP-5.0.23-Remote-Code-Execution.html
2024-05-26 14:27:05 +02:00
- https://github.com/xiayulei/open_source_bms/issues/33
2024-06-09 00:33:16 +00:00
- https://github.com/xiayulei/open_source_bms/issues/33
2024-05-26 14:27:05 +02:00
- https://www.exploit-db.com/exploits/46488/
2024-06-09 00:33:16 +00:00
- https://www.exploit-db.com/exploits/46488/
2024-05-26 14:27:05 +02:00
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/adminlove520/SEC-GPT
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/sechelper/awesome-chatgpt-prompts-cybersecurity
- https://github.com/veo/vscan