ThinkPHP.Controller.Parameter.Remote.Code.Execution
Description
This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in ThinkPHP.
The vulnerability is a result of the application's failure to properly sanitize user request. As a result, a remote attacker can send a crafted HTTP request to execute arbitrary code on a vulnerable server.
Affected Products
v5.x below v5.0.23,v5.1.31
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor:
https://blog.thinkphp.cn/869075
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2021-08-17 | 18.141 | Sig Added |
2020-08-12 | 15.904 | Sig Added |
2020-08-04 | 15.899 | Sig Added |
2019-03-29 | 14.583 | Sig Added |
2019-02-28 | 14.562 | Sig Added |
2019-01-29 | 14.536 | Severity:medium:critical |
2019-01-11 | 14.522 | Default_action:pass:drop |
2018-12-28 | 13.515 |