漏洞描述
fofa app="ThinkPHP"
id: thinkphp-detect
info:
name: ThinkPHP detect
author: zan8in
severity: info
verified: true
description: fofa app="ThinkPHP"
rules:
r0:
request:
method: GET
path: /index.php?m=1
expression: '"ThinkPHP</a><sup>([0-9]+.[0-9]+.[0-9]+)</sup>".bmatches(response.body)'
expression: r0()