Vulnerability Details : CVE-2019-9082
Public exploit exists!
ThinkPHP before 3.2.4, as used in Open Source BMS v1.1.1 and other products, allows Remote Command Execution via public//?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]= followed by the command.
Products affected by CVE-2019-9082
- cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:*
- cpe:2.3:a:zzzcms:zzzphp:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:opensourcebms:open_source_background_management_system:1.1.1:*:*:*:*:*:*:*
CVE-2019-9082 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
ThinkPHP Remote Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
ThinkPHP contains an unspecified vulnerability that allows for remote code execution via public//?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]= followed by the command.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2019-9082
Added on
2021-11-03
Action due date
2022-05-03
Exploit prediction scoring system (EPSS) score for CVE-2019-9082
96.99%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2019-9082
-
ThinkPHP Multiple PHP Injection RCEs
Disclosure Date: 2018-12-10First seen: 2020-04-26exploit/unix/webapp/thinkphp_rceThis module exploits one of two PHP injection vulnerabilities in the ThinkPHP web framework to execute code as the web user. Versions up to and including 5.0.23 are exploitable, though 5.0.23 is vulnerable to a separate vulnerability. The module will automat
CVSS scores for CVE-2019-9082
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2019-9082
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
-
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-9082
-
https://www.exploit-db.com/exploits/46488/
zzzphp CMS 1.6.1 - Cross-Site Request ForgeryExploit;Third Party Advisory;VDB Entry
-
https://github.com/xiayulei/open_source_bms/issues/33
There is A RCE vulnerability in your system. · Issue #33 · xiayulei/open_source_bms · GitHubExploit;Issue Tracking;Third Party Advisory
-
http://packetstormsecurity.com/files/157218/ThinkPHP-5.0.23-Remote-Code-Execution.html
ThinkPHP 5.0.23 Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to