
Cloud Vulnerability DB
A community-led vulnerabilities database
ThinkPHP Framework v5.0.24 was discovered to contain a configuration vulnerability related to the PATHINFO parameter. This issue was disclosed in March 2022 and has been disputed by third parties. The vulnerability allows attackers to access system environment parameters through index.php when the PATHINFO parameter is not properly configured (NVD, CVE).
The vulnerability exists in the default configuration of ThinkPHP 5.0.24 where the PATHINFO parameter is not configured. When this occurs, the system processes URLs in the format http://serverName/index.php?s=/module/controller/operation/[Parameter name/Parameter values...]. If the specified module is not found, the system may expose sensitive environment information through error messages (GitHub).
When exploited, this vulnerability allows attackers to access all system environment parameters from index.php. However, it's worth noting that this has been disputed as some argue that system environment exposure is an intended feature of the debugging mode (CVE).
Since this is a configuration-related vulnerability, proper configuration of the PATHINFO parameter in ThinkPHP 5.0.24 installations can prevent the information disclosure. Additionally, if the exposure is intended for debugging purposes, it should be disabled in production environments (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."