dependabot[bot] 5d77f74c36
Bump requests from 2.20.0 to 2.31.0 in /tp5-getshell
Bumps [requests](https://github.com/psf/requests) from 2.20.0 to 2.31.0.
- [Release notes](https://github.com/psf/requests/releases)
- [Changelog](https://github.com/psf/requests/blob/main/HISTORY.md)
- [Commits](https://github.com/psf/requests/compare/v2.20.0...v2.31.0)

---
updated-dependencies:
- dependency-name: requests
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-05-22 21:38:00 +00:00
..
2019-08-20 20:49:52 +08:00
2019-10-11 19:21:56 +08:00
2019-08-20 20:49:52 +08:00
2019-10-11 19:30:20 +08:00
2019-08-20 20:49:52 +08:00

tp5-getshell.py - thinkphp5 rce漏洞检测工具


概述

控制器过滤不严导致rce,漏洞详情参考

thinkphp5 RCE漏洞重现及分析


本工具支持单url/批量检测有phpinfo模式、cmd shell模式、getshell(写一句话)模式批量检测直接使用getshell模式。

需求

python2.7


pip install -r requirements.txt

快速开始

python tp5-getshell.py -h



单url检测phpinfo模式

使用4种poc-phpinfo检测

python tp5-getshell.py -u http://www.xxx.com:8888/think5124/public/


单url检测getshell模式

使用3种exp进行getshell遇到先成功的exp就停止防止重复getshell

python tp5-getshell.py -u http://www.xxx.com:8888/think5124/public/ exploit



单url检测cmd shell模式

python tp5-getshell.py -u http://www.xxx.com/ cmdshell



批量检测getshell

使用3种exp进行getshell遇到先成功的exp就停止防止重复getshell

python tp5-getshell.py -f urls.txt -t 2 -s 10



反馈

博客: http://www.lsablog.com/
gmail: lsasguge196@gmail.com
qq: 2894400469@qq.com
issues: https://github.com/theLSA/tp5-getshell/issues