ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php. NOTE: this is disputed by a third party because system environment exposure is an intended feature of the debugging mode.
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md | third party advisory exploit |