CVE-2020-17952

9.8 CRITICAL

📋 TL;DR

This is a critical remote code execution vulnerability in Twothink v2.0 that allows attackers to execute arbitrary PHP code via the /library/think/App.php file. Any organization running Twothink v2.0 is affected, potentially allowing complete system compromise.

💻 Affected Systems

Products:
  • Twothink
Versions: v2.0
Operating Systems: All operating systems running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Twothink v2.0 installations with the vulnerable App.php file present.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with attacker gaining full control over the web server, accessing sensitive data, installing malware, and using the system as a pivot point for further attacks.

🟠

Likely Case

Attackers deploy web shells, steal sensitive data, deface websites, or use the compromised system for cryptocurrency mining or DDoS attacks.

🟢

If Mitigated

With proper network segmentation and least privilege, impact could be limited to the web application layer, though data breach would still be likely.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability appears to be in a core file and exploitation is straightforward based on the CVE description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://github.com/twothink/twothink/issues/1

Restart Required: No

Instructions:

Check the GitHub repository for any security patches or updates. Consider upgrading to a newer version if available or switching to a maintained alternative.

🔧 Temporary Workarounds

Remove vulnerable file

linux

Delete or rename the vulnerable App.php file if not essential for functionality

mv /path/to/library/think/App.php /path/to/library/think/App.php.bak

Restrict file access

linux

Set strict file permissions on the vulnerable file

chmod 000 /path/to/library/think/App.php

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with rules to block requests to /library/think/App.php
  • Isolate the affected system in a DMZ with strict outbound network controls

🔍 How to Verify

Check if Vulnerable:

Check if /library/think/App.php exists in your Twothink installation and verify the version is v2.0

Check Version:

Check Twothink configuration files or documentation for version information

Verify Fix Applied:

Verify the vulnerable file has been removed, renamed, or permissions restricted

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST/GET requests to /library/think/App.php
  • Sudden appearance of PHP files in unexpected directories
  • Web server errors related to App.php

Network Indicators:

  • HTTP requests containing suspicious PHP code patterns
  • Traffic to known malicious IPs from the web server

SIEM Query:

source="web_logs" AND (uri="/library/think/App.php" OR uri CONTAINS "App.php")

🔗 References

📤 Share & Export