CVE-2022-25481
PHP vulnerability analysis and mitigation

Overview

ThinkPHP Framework v5.0.24 was discovered to contain a configuration vulnerability related to the PATHINFO parameter. This issue was disclosed in March 2022 and has been disputed by third parties. The vulnerability allows attackers to access system environment parameters through index.php when the PATHINFO parameter is not properly configured (NVD, CVE).

Technical details

The vulnerability exists in the default configuration of ThinkPHP 5.0.24 where the PATHINFO parameter is not configured. When this occurs, the system processes URLs in the format http://serverName/index.php?s=/module/controller/operation/[Parameter name/Parameter values...]. If the specified module is not found, the system may expose sensitive environment information through error messages (GitHub).

Impact

When exploited, this vulnerability allows attackers to access all system environment parameters from index.php. However, it's worth noting that this has been disputed as some argue that system environment exposure is an intended feature of the debugging mode (CVE).

Mitigation and workarounds

Since this is a configuration-related vulnerability, proper configuration of the PATHINFO parameter in ThinkPHP 5.0.24 installations can prevent the information disclosure. Additionally, if the exposure is intended for debugging purposes, it should be disabled in production environments (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management