漏洞描述
由于ThinkPHP5.0框架对Request类的method处理存在缺陷,导致黑客构造特定的请求,可直接GetWebShell。
漏洞评级
严重
影响版本
ThinkPHP 5.0系列 < 5.0.24
安全版本
ThinkPHP 5.0系列 5.0.24
ThinkPHP 5.1系列 5.1.31
安全建议
升级ThinkPHP至安全版本
修复方法1.打开
\thinkphp\library\think\Request.php
搜索
public function method($method = false) ???{ ???????if (true === $method) { ???????????// 获取原始请求类型 ???????????return $this->server(‘REQUEST_METHOD‘) ?: ‘GET‘; ???????} elseif (!$this->method) { ???????????if (isset($_POST[Config::get(‘var_method‘)])) { ???????????????$this->method = strtoupper($_POST[Config::get(‘var_method‘)]); ???????????????$this->{$this->method}($_POST); ???????????} elseif (isset($_SERVER[‘HTTP_X_HTTP_METHOD_OVERRIDE‘])) { ???????????????$this->method = strtoupper($_SERVER[‘HTTP_X_HTTP_METHOD_OVERRIDE‘]); ???????????} else { ???????????????$this->method = $this->server(‘REQUEST_METHOD‘) ?: ‘GET‘; ???????????} ???????} ???????return $this->method; ???}
改为
public function method($method = false) ???{ ???????if (true === $method) { ???????????// 获取原始请求类型 ???????????return $this->server(‘REQUEST_METHOD‘) ?: ‘GET‘; ???????} elseif (!$this->method) { ???????????if (isset($_POST[Config::get(‘var_method‘)])) { ???????????????$method = strtoupper($_POST[Config::get(‘var_method‘)]); ???????????????if (in_array($method, [‘GET‘, ‘POST‘, ‘DELETE‘, ‘PUT‘, ‘PATCH‘])) { ???????????????????$this->method = $method; ???????????????????$this->{$this->method}($_POST); ???????????????} else { ???????????????????$this->method = ‘POST‘; ???????????????} ???????????????unset($_POST[Config::get(‘var_method‘)]); ???????????} elseif (isset($_SERVER[‘HTTP_X_HTTP_METHOD_OVERRIDE‘])) { ???????????????$this->method = strtoupper($_SERVER[‘HTTP_X_HTTP_METHOD_OVERRIDE‘]); ???????????} else { ???????????????$this->method = $this->server(‘REQUEST_METHOD‘) ?: ‘GET‘; ???????????} ???????} ???????return $this->method; ???}
ThinkPHP 小于5.0.24 远程代码执行高危漏洞 修复方案
原文地址:https://www.cnblogs.com/baker95935/p/10298284.html