7.5
CVSSv3

CVE-2020-25540

Published: 14/09/2020 Updated: 07/12/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 447
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

thinkadmin thinkadmin 6.0

Exploits

ThinkAdmin version 6 suffers from an arbitrary file read vulnerability ...

Github Repositories

ThinkAdmin CVE-2020-25540 POC

ThinkAdmin-CVE-2020-25540 ThinkAdmin CVE-2020-25540 POC * Usage $ python3 exploitpy -t <IP> -c <command>

ThinkAdmin未授权列目录/任意文件读取 cve-2020-25540 使用方式 python3 cve-2020-25540py url

ThinkAdmin未授权列目录/任意文件读取 cve-2020-25540 使用方式 python3 cve-2020-25540py url

ThinkAdmin CVE-2020-25540 poc

CVE-2020-25540 ThinkAdmin CVE-2020-25540 poc 由于目录穿越那个洞太鸡肋,就只写了文件读取功能,带哥们轻喷,多多指教,感激不尽。 逻辑参考php源码,关键是加密方式,看一看就懂了 use age: python3 pocpy -t <IP> -c <command>

ThinkAdmin CVE-2020-25540 poc

CVE-2020-25540 ThinkAdmin CVE-2020-25540 poc 由于目录穿越那个洞太鸡肋,就只写了文件读取功能,带哥们轻喷,多多指教,感激不尽。 逻辑参考php源码,关键是加密方式,看一看就懂了 use age: python3 pocpy -t <IP> -c <command>