FortiDAST
FortiDAST performs automated black-box dynamic application security testing of web applications to identify vulnerabilities that bad actors may exploit.
dmaciejak
Staff
Staff
Article Id 253155
Description

This article describes the ThinkPHP remote code execution vulnerabilities assessment with FortiDAST.

 

CVE-2018-20062, CVE-2019-9082 vulnerabilities were discovered in ThinkPHP. ThinkPHP is a free framework distributed under the Apache2 open-source license primarily used for Web application development and simplifying enterprise application development.

Those vulnerabilities are old but still actively exploited in the wild.

By crafting malicious parameters an attacker can execute remote arbitrary PHP code and get full control of the target.

Scope

FortiDAST version 21.3

Solution

Detection against that vulnerability is empowered by the FortiDAST Scripting Engine (FSE).

 

This technology enables FortiDAST to assess remotely with high level of confidence if an asset is vulnerable to a specific vulnerability by testing the disarmed exploit against the asset itself.

 

To configure the scan, you will need to enable the FSE group signature “thinkphp” which will select the underlying scripts:

CVE-2018-20062 ThinkPHP Controller Parameter Remote Code Execution

CVE-2019-9082 ThinkPHP Controller Parameter Remote Code Execution

 

For reference, a step-by-step guide on how to configure FortiPenTest/FortiDAST to trigger FSE can be found on Fortinet’s blog.

 

For more details regarding mitigating the vulnerability by utilizing Fortinet products, refer to https://www.fortiguard.com/outbreak-alert/thinkphp-rce

Contributors