{"id":"GHSA-pjhx-j53p-c5f5","summary":"ThinkPHP deserialization vulnerability","details":"A deserialization vulnerability in the component \\controller\\Index.php of Thinkphp v6.1.3 to v8.0.4 allows attackers to execute arbitrary code.","aliases":["CVE-2024-48112"],"modified":"2024-10-30T22:27:24.671690Z","published":"2024-10-30T21:30:40Z","database_specific":{"github_reviewed_at":"2024-10-30T22:08:15Z","github_reviewed":true,"cwe_ids":["CWE-502"],"severity":"HIGH","nvd_published_at":"2024-10-30T21:15:14Z"},"references":[{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-48112"},{"type":"WEB","url":"https://github.com/nn0nkey/nn0nkey/blob/main/Thinkphp/CVE-2024-48112.md"},{"type":"PACKAGE","url":"https://github.com/top-think/think"}],"affected":[{"package":{"name":"topthink/thinkphp","ecosystem":"Packagist","purl":"pkg:composer/topthink/thinkphp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"6.1.3"},{"last_affected":"8.0.4"}]}],"database_specific":{"source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-pjhx-j53p-c5f5/GHSA-pjhx-j53p-c5f5.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P"}]}