uoload-labs 04 源码:
$is_upload = false;
$msg = null;
if (isset($_POST['submit'])) {
if (file_exists(UPLOAD_PATH)) {
$deny_ext = array(".php",".php5",".php4",".php3",".php2",".php1",".html",".htm",".phtml",".pht",".pHp",".pHp5",".pHp4",".pHp3",".pHp2",".pHp1",".Html",".Htm",".pHtml",".jsp",".jspa",".jspx",".jsw",".jsv",".jspf",".jtml",".jSp",".jSpx",".jSpa",".jSw",".jSv",".jSpf",".jHtml",".asp",".aspx",".asa",".asax",".ascx",".ashx",".asmx",".cer",".aSp",".aSpx",".aSa",".aSax",".aScx",".aShx",".aSmx",".cEr",".sWf",".swf",".ini");
$file_name = trim($_FILES['upload_file']['name']);
$file_name = deldot($file_name);//删除文件名末尾的点
$file_ext = strrchr($file_name, '.');
$file_ext = strtolower($file_ext); //转换为小写
$file_ext = str_ireplace('::$DATA', '', $file_ext);//去除字符串::$DATA
$file_ext = trim($file_ext); //收尾去空
if (!in_array($file_ext, $deny_ext)) {
$temp_file = $_FILES['upload_file']['tmp_name'];
$img_path = UPLOAD_PATH.'/'.$file_name;
if (move_uploaded_file($temp_file, $img_path)) {
$is_upload = true;
} else {
$msg = '上传出错!';
}
} else {
$msg = '此文件不允许上传!';
}
} else {
$msg = UPLOAD_PATH . '文件夹不存在,请手工创建!';
}
}
代码解析:
第五行代码在黑名单校验方面做的更为严格,几乎将所有可以上传的后缀类型都过滤掉了。
第十五行和第十六行,将前端传入的源文件名后缀直接拼接UPLOAD_PATH
赋值给变量$img_path
而没有进行重命名的操作,然后通过move_uploaded_file()
函数将临时文件移动到$img_path
中。
上述代码既然没有用到重命名文件,我们是不是就可以通过先上传.htaccess文件,由于我们知道.htaccess文件时可以控制什么样的后缀可以被当成php代码执行,所以我们在后面添加.jpg,这样.jpg文件就会被当做php问价执行。
AddHandler application/x-httpd-php .php5 .php3 .pht .phtml .phps .jpg
上传绕过:
首先上传.htaccess文件(.htaccess文件作用于向下兼容)
然后再上传包含一句话木马的.jpg文件,图片被当做PHP代码解析。