摘要: example1: http://192.168.91.139/xml/example1.php?xml=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22UTF-8%22%3F%3E%3C%21DOCTYPE%20UserInfo%5B%3C%21EN 阅读全文
posted @ 2016-07-22 16:18 Bypass 阅读(603) 评论(0) 推荐(0)
摘要: Example 1 输入单引号,报错,得到物理路径 可通过../../../../etc/paaswd 读取敏感信息 可包含本地文件或远程文件 https://assets.pentesterlab.com/test_include.txt Example 2 加单引号,报错,可发现获取到的参数后面 阅读全文
posted @ 2016-07-22 15:57 Bypass 阅读(1901) 评论(1) 推荐(0)