Vulnerability Description
ThinkPHP 3.2.4 has SQL Injection via the order parameter because the Library/Think/Db/Driver.class.php parseOrder function mishandles the key variable.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Thinkphp | Thinkphp | 3.2.4 |
Related Weaknesses (CWE)
References
- https://98587329.github.io/2018/10/09/thinkphp%E6%B3%A8%E5%85%A5%E5%88%86%E6%9E%ExploitThird Party Advisory
- https://github.com/top-think/thinkphp/commit/9748cb80d2f24c89218f358ca2f5ab88ee3PatchVendor Advisory
- https://98587329.github.io/2018/10/09/thinkphp%E6%B3%A8%E5%85%A5%E5%88%86%E6%9E%ExploitThird Party Advisory
- https://github.com/top-think/thinkphp/commit/9748cb80d2f24c89218f358ca2f5ab88ee3PatchVendor Advisory
FAQ
What is CVE-2018-18546?
CVE-2018-18546 is a vulnerability with a CVSS score of 9.8 (CRITICAL). ThinkPHP 3.2.4 has SQL Injection via the order parameter because the Library/Think/Db/Driver.class.php parseOrder function mishandles the key variable.
How severe is CVE-2018-18546?
CVE-2018-18546 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-18546?
Check the references section above for vendor advisories and patch information. Affected products include: Thinkphp Thinkphp.