Thinkadmin

Thinkadmin

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Veröffentlicht 04.11.2024 01:15:03
  • Zuletzt bearbeitet 06.11.2024 15:04:49

A vulnerability, which was classified as critical, was found in ThinkAdmin up to 6.1.67. Affected is the function script of the file /app/admin/controller/api/Plugs.php. The manipulation of the argument uptoken leads to deserialization. It is possibl...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 04.12.2023 16:15:11
  • Zuletzt bearbeitet 21.11.2024 08:32:40

An issue in the component /admin/api.plugs/script of ThinkAdmin v6.1.53 allows attackers to getshell via providing a crafted URL to download a malicious PHP file.

Exploit
  • EPSS 0.2%
  • Veröffentlicht 04.12.2023 16:15:11
  • Zuletzt bearbeitet 21.11.2024 08:32:40

An arbitrary file upload vulnerability in the component /admin/api.upload/file of ThinkAdmin v6.1.53 allows attackers to execute arbitrary code via a crafted Zip file.

Exploit
  • EPSS 0.12%
  • Veröffentlicht 15.06.2023 18:15:09
  • Zuletzt bearbeitet 21.11.2024 08:07:36

An arbitrary file upload vulnerability in the component /api/upload.php of ThinkAdmin v6 allows attackers to execute arbitrary code via a crafted file.

Exploit
  • EPSS 1.1%
  • Veröffentlicht 03.03.2021 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:27:09

ThinkAdmin v6 has default administrator credentials, which allows attackers to gain unrestricted administratior dashboard access.

Exploit
  • EPSS 11.2%
  • Veröffentlicht 13.01.2021 18:15:14
  • Zuletzt bearbeitet 21.11.2024 05:13:58

An insecure unserialize vulnerability was discovered in ThinkAdmin versions 4.x through 6.x in app/admin/controller/api/Update.php and app/wechat/controller/api/Push.php, which may lead to arbitrary remote code execution.

Exploit
  • EPSS 0.2%
  • Veröffentlicht 01.12.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:23:53

ThinkAdmin version v1 v6 has a stored XSS vulnerability which allows remote attackers to inject an arbitrary web script or HTML.

Exploit
  • EPSS 93.97%
  • Veröffentlicht 14.09.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 05:18:06

ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter.

Exploit
  • EPSS 0.35%
  • Veröffentlicht 08.04.2019 21:29:01
  • Zuletzt bearbeitet 21.11.2024 04:20:22

application\admin\controller\User.php in ThinkAdmin V4.0 does not prevent continued use of an administrator's cookie-based credentials after a password change.