Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-25540 PoC — ThinkAdmin 路径遍历漏洞

Source
Associated Vulnerability
Title:ThinkAdmin 路径遍历漏洞 (CVE-2020-25540)
Description:ThinkAdmin是一套基于ThinkPHP框架的通用后台管理系统。 ThinkAdmin 6版本存在路径遍历漏洞。攻击者可利用该漏洞通过GET请求编码参数任意读取远程服务器上的文件。
Description
ThinkAdmin CVE-2020-25540 poc
Readme
# CVE-2020-25540
ThinkAdmin CVE-2020-25540 poc

由于目录穿越那个洞太鸡肋,就只写了文件读取功能,带哥们轻喷,多多指教,感激不尽。
逻辑参考php源码,关键是加密方式,看一看就懂了

use age:

python3 poc.py -t \<IP\> -c \<command\>
File Snapshot

[4.0K] /data/pocs/e4a611ce66f31f541f8577e8ced42d28e5d84298 ├── [1.0K] LICENSE ├── [1.2K] poc.py └── [ 287] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.