[WEEK3]IncludeTwo
源码
<?php
error_reporting(0);
highlight_file(__FILE__);
//Can you get shell? RCE via LFI if you get some trick,this question will be so easy!
if(!preg_match("/base64|rot13|filter/i",$_GET['file']) && isset($_GET['file'])){
include($_GET['file'].".php");
}else{
die("Hacker!");
}限制伪协议和文件后缀,很容易联想到pear
用P牛的payload直接打,用burp发包避免被转义
Last updated