Skip to content

Access Control: ThinkPHP ⅔ - Remote Code Execution

Identifier: thinkphp_2_rce

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner ASM Scanner

Description

ThinkPHP 2.x and 3.0 in Lite mode are susceptible to remote code execution via the s parameter, allowing attackers to execute malware, obtain sensitive information, modify data, and gain full control over compromised systems without authentication.

How we test: We test for remote code execution vulnerabilities in ThinkPHP by injecting malicious payloads into the s parameter and analyzing responses to detect if arbitrary code can be executed.

Reference:

Configuration

Example

Example configuration:

---
security_tests:
  thinkphp_2_rce:
    skip: false

Reference

skip

Type : boolean

Skip the test if true.