Recently we received a warning about the 3.2 version of the vulnerability, the official has been processed and updated the first time. Since the 3.2 version has undergone an official maintenance and security update cycle, and a large number of developers have developed two times, no new version is released, and official security bulletins and fixes are only recommended. Please also use the 3.2 version of the user to do the following security repair (only need to modify a core built-in public function code).
Again: Regardless of whether the core is modified, refer to the following repair method to repair, do not need to download any update packages and patch packs. By the way, if you are using version 5.0 or 5.1, it is also recommended to update to the latest version, the official recently released security update, directly composer upgrade to the latest version.
Locate the common/functions.php file in the thinkphp directory, and then search for the Think_filter function, and the code is modified to:
if (Preg_match ('/^ (exp| neq| Gt| Egt|lt| elt|or| xor| like| notlike| Not between| notbetween| between| notin| Not in| in| BIND) $/i ', $value)) {
$value. = ';
}
Then empty the project's compilation cache file, repair finished!
ThinkPHP3.2 Version Security update