东方有鱼名为咸 9af99d6368
Update README.md
2019-10-11 19:21:56 +08:00

85 lines
1.5 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

tp5-getshell.py - thinkphp5 rce漏洞检测工具
==
-----------------------
# 概述
控制器过滤不严导致rce,漏洞详情参考
[thinkphp5 RCE漏洞重现及分析](demo/lsablog.com-ThinkPHP5%20RCE漏洞重现及分析.pdf)
<br/>
本工具支持单url/批量检测有phpinfo模式、cmd shell模式、getshell(写一句话)模式批量检测直接使用getshell模式。
<br/>
-----------------------
# 需求
python2.7
<br/>
pip install -r requirements.txt
<br/>
-----------------------
# 快速开始
python tp5-getshell.py -h<br/>
![](demo/p4.png)<br/>
<br/>
单url检测phpinfo模式<br/>
使用4种poc-phpinfo检测<br/>
python tp5-getshell.py -u http://www.xxx.com:8888/think5124/public/<br/>
![](demo/p3.png)<br/>
<br/>
单url检测getshell模式<br/>
使用3种exp进行getshell遇到先成功的exp就停止防止重复getshell<br/>
python tp5-getshell.py -u http://www.xxx.com:8888/think5124/public/ exploit<br/>
![](demo/p2.png)<br/>
<br/>
单url检测cmd shell模式<br/>
python tp5-getshell.py -u http://www.xxx.com/ cmdshell<br/>
![](demo/p1.png)<br/>
<br/>
批量检测getshell<br/>
使用3种exp进行getshell遇到先成功的exp就停止防止重复getshell<br/>
python tp5-getshell.py -f urls.txt -t 2 -s 10<br/>
![](demo/p0.png)<br/>
<br/>
----------------------
# 反馈
博客: http://www.lsablog.com/<br/>
gmail: lsasguge196@gmail.com<br/>
qq: 2894400469@qq.com<br/>
issues: https://github.com/theLSA/tp5-getshell/issues