[WEEK3]IncludeTwo

源码

<?php
error_reporting(0);
highlight_file(__FILE__);
//Can you get shell? RCE via LFI if you get some trick,this question will be so easy!
if(!preg_match("/base64|rot13|filter/i",$_GET['file']) && isset($_GET['file'])){
    include($_GET['file'].".php");
}else{
    die("Hacker!");
}

限制伪协议和文件后缀,很容易联想到pear

用P牛的payload直接打,用burp发包避免被转义

Last updated