ThinkPHP.Request.Method.Remote.Code.Execution
Description
This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in ThinkPHP.
The vulnerability is a result of the application's failure to properly sanitize user request. As a result, a remote attacker can send a crafted HTTP request to execute arbitrary code on a vulnerable server.
Affected Products
ThinkPHP version 5 and earlier versions
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor:
https://blog.thinkphp.cn/910675
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2020-06-09 | 15.861 | Sig Added |
2019-04-23 | 14.598 | Sig Added |
2019-03-15 | 14.575 | Default_action:pass:drop |
2019-02-05 | 14.542 |