An issue was discovered in NoneCms V1.3. thinkphp/library/think/App.php allows remote attackers to execute arbitrary PHP code via crafted use of the filter parameter, as demonstrated by the s=index/thinkRequest/input&filter=phpinfo&data=1 query string.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Nonecms | 5none | 1.3.0 (including) | 1.3.0 (including) |