
Cloud Vulnerability DB
A community-led vulnerabilities database
ThinkPHP versions 5.1.41 and 5.0.24 contain a code logic error vulnerability that enables file upload getshell functionality (CVE-2022-44289). The vulnerability was discovered and reported on October 23, 2022 (GitHub Issue).
The vulnerability exists in the file upload functionality within ThinkPHP's framework. The issue stems from a logic error in the checkImg() function located in thinkphp/library/think/File.php (line 272). The function's implementation of image file validation contains reversed true/false logic, which fails to properly validate file extensions and allows unauthorized file uploads, including PHP files (GitHub Issue).
This vulnerability allows attackers to upload malicious PHP files to the server through the file upload functionality, potentially leading to remote code execution via shell access. The impact is severe as it could result in complete server compromise (MITRE CVE).
Users should upgrade to a version newer than ThinkPHP 5.1.41 or 5.0.24 where this vulnerability has been addressed. Additionally, implementing proper file upload validation and restrictions at the application level can help mitigate this vulnerability (MITRE CVE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."