Access Control: ThinkPHP ⅔ - Remote Code Execution¶
Identifier:
thinkphp_2_rce
Scanner(s) Support¶
| GraphQL Scanner | REST Scanner | WebApp Scanner | ASM Scanner |
|---|---|---|---|
Description¶
ThinkPHP 2.x and 3.0 in Lite mode are susceptible to remote code execution via the s parameter, allowing attackers to execute malware, obtain sensitive information, modify data, and gain full control over compromised systems without authentication.
How we test: We test for remote code execution vulnerabilities in ThinkPHP by injecting malicious payloads into the s parameter and analyzing responses to detect if arbitrary code can be executed.
Reference:
Configuration¶
Example¶
Example configuration:
Reference¶
skip¶
Type : boolean
Skip the test if true.