ThinkPHP RCE

Details of BNVL-2019-0030

What does the BNVL label mean?

BitNinja Server Security’s BNVL identifiers are intended for use to identify publicly known information security vulnerabilities in publicly released software packages. This project was designed to collect and analyze attack information from the BitNinja network after cluster analysis by the AI-powered Attack Vector Miner. More than 100 vulnerability types have been discovered with this project so far, so we decided to publish this platform to help to keep Linux server owners up-to-date.

Important! All listed BNVL vulnerabilities are protected by BitNinja PRO, so please check your configurations if your infrastructure is affected by any of them.

Syntax for BNVL labels:

BNVL prefix + Year + Arbitrary Digits


Name : 
ThinkPHP RCE
Related Links: 
https://securitynews.sonicwall.com/xmlpost/thinkphp-remote-code-execution-rce-bug-is-actively-being-exploited/ 
https://medium.com/@knownsec404team/analysis-of-thinkphp5-remote-code-execution-vulnerability-5de8a0afb2d4

CVE ID: Na

Description: 

The attacker (probably through a command and contorl server) sent a request to check if a previously installed backdoor is present on the server.

On December 10, 2018, ThinkPHP officially released the Security Update of ThinkPHP 5.Version*, which fixed a remote code execution vulnerability. Because the ThinkPHP framework does not adequately detect the controller name, the attacker could implement remote code execution.
The Vulnerability Intelligence Team — Knownsec 404 Team.

Pattern: HelloThinkPHP