mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-30 18:20:53 +00:00
28 lines
1.2 KiB
Markdown
28 lines
1.2 KiB
Markdown
![]() |
### [CVE-2019-9082](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9082)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
ThinkPHP before 3.2.4, as used in Open Source BMS v1.1.1 and other products, allows Remote Command Execution via public//?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]= followed by the command.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/157218/ThinkPHP-5.0.23-Remote-Code-Execution.html
|
||
|
- https://github.com/xiayulei/open_source_bms/issues/33
|
||
|
- https://www.exploit-db.com/exploits/46488/
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/ARPSyndicate/kenzer-templates
|
||
|
- https://github.com/Elsfa7-110/kenzer-templates
|
||
|
- https://github.com/Ostorlab/KEV
|
||
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||
|
- https://github.com/adminlove520/SEC-GPT
|
||
|
- https://github.com/d4n-sec/d4n-sec.github.io
|
||
|
- https://github.com/sechelper/awesome-chatgpt-prompts-cybersecurity
|
||
|
- https://github.com/veo/vscan
|
||
|
|