| Title | https://thinkadmin.top/ ThinkAdmin v6 <=v6.1.67 Remote Code Execute |
|---|
| Description | ThinkAdmin is a general backend management system based on the ThinkPHP framework. Versions v6.1.67 and below have a security vulnerability that allows for arbitrary code execution. Attackers can exploit this vulnerability to execute arbitrary system commands without authorization. |
|---|
| Source | ⚠️ https://github.com/pwysec/Xmwcq/blob/main/1.md |
|---|
| User | p1wy (UID 75818) |
|---|
| Submission | 10/27/2024 15:42 (1 Year ago) |
|---|
| Moderation | 11/03/2024 07:20 (7 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 282918 [ThinkAdmin up to 6.1.67 Plugs.php script uptoken deserialization] |
|---|
| Points | 17 |
|---|