.. / CVE-2022-47945

Exploit for Thinkphp Lang - Local File Inclusion (CVE-2022-47945)

Description:

ThinkPHP Framework before 6.0.14 allows local file inclusion via the lang parameter when the language pack feature is enabled (lang_switch_on=true). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including pearcmd.php.

Nuclei Template

View the template here CVE-2022-47945.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-47945.yaml
Copy

References:

https://github.com/top-think/framework/commit/c4acb8b4001b98a0078eda25840d33e295a7f099
https://github.com/top-think/framework/compare/v6.0.13...v6.0.14
https://github.com/ARPSyndicate/kenzer-templates
https://nvd.nist.gov/vuln/detail/CVE-2022-47945
https://tttang.com/archive/1865/