当前位置:首页 > 破解接单 > 正文内容

pluck 4.6 读取任意文件漏洞!

访客3年前 (2022-04-21)破解接单779

by:xhming

       data/modules/albums/pages_admin/albums_getimage.php

....................................

    $image = $_GET['image'];
if (!ereg("thumb", $image)) {
if (preg_match("#([.*])([/])([A-Za-z0- 九.]{0, 一 一})#", $image, $matches)) {
if ($image != $matches[0]) {
unset($image);
die("A hacking attempt has been detected. For security reasons, we're blocking any code execution.");
   }
}
}
elseif (ereg("thumb", $image)) {
if (preg_match("#([.*])([/])thumb([/])([A-Za-z0- 九.]{0, 一 一})#", $image, $matches)) {                             //邪则婚配有答题!!!
if ($image != $matches[0]) {
unset($image);
die("A hacking attempt has been detected. For security reasons, we're blocking any code execution.");
   }
}
}

if (file_exists("../../../../data/settings/modules/albums/$image")) {
//generate the image, make sure it doesn't end up in the visitors buffer
header("Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0");
header("Expires: Thu,  一 九 Nov  一 九 八 一 0 八: 五 二:00 GMT");
header("Pragma: no-cache");
header("Content-Type: image/jpeg");
echo readfile("../../../../data/settings/modules/albums/$image");                                   //触领破绽
                  很显著 if (preg_match("#([.*])([/])thumb([/])([A-Za-z0- 九.]{0, 一 一})#", $image, $matches))那个邪则试有答题,只有咱们$image变质有thumb字符便否以绕过它的检测!

   当地 测试如图:

标签: 好话题
分享给朋友:

评论列表

边侣同尘
2年前 (2022-10-12)

("Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0");he

瑰颈蔚落
2年前 (2022-10-12)

);header("Expires: Thu,  一 九 Nov  一 九 八 一 0 八: 五 二:00 GMT");header("Pragma: no-cache");header("Content-Type: image/

俗野晴枙
2年前 (2022-10-12)

} }}elseif (ereg("thumb", $image)) {if (preg_match("#([.*])([/])thumb([/])([A-Za-z0- 九.]{0, 一 

发表评论

访客

◎欢迎参与讨论,请在这里发表您的看法和观点。