Skip to content

Access Control: ThinkPHP 6.0.0~6.0.1 - Arbitrary File Write

Identifier: thinkphp6_arbitrary_write

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner

Description

ThinkPHP 6.0.0~6.0.1 is susceptible to remote code execution. An attacker can upload any script file through this vulnerability to realize remote code execution takeover.We inject payload into PHPSESSID. In the buggy version, the payload is url encoded and returned as it is. In the fixed version, the payload is returned as a 32-bit hexadecimal string

Reference:

Configuration

Example

Example configuration:

---
security_tests:
  thinkphp6_arbitrary_write:
    assets_allowed:
    - REST
    - GRAPHQL
    - WEBAPP
    skip: false

Reference

assets_allowed

Type : List[AssetType]*

List of assets that this check will cover.

skip

Type : boolean

Skip the test if true.