Authorization Bypass Affecting thinkcmf/thinkcmf package, versions >=0.0.0, <v6.0.8


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (26th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Authorization Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-THINKCMFTHINKCMF-2869620
  • published14 Jun 2022
  • disclosed14 Jun 2022
  • creditSwagtimeao

Introduced: 14 Jun 2022

CVE-2021-40616  (opens in a new tab)
CWE-285  (opens in a new tab)

How to fix?

Upgrade thinkcmf/thinkcmf to version v6.0.8 or higher.

Overview

thinkcmf/thinkcmf is a ThinkCMF based on ThinkPHP 5.1 , it is a free and open source Content Management Framework(CMF).

Affected versions of this package are vulnerable to Authorization Bypass where the attacker can modify the password of the administrator account with id 1 through the background user management group permissions. Note: The use condition is that the background user management group authority is required.

References

CVSS Base Scores

version 3.1