Of unsafe file download and upload - upload loopholes - upload rename compete with Apache parsing vulnerability to bypass - and - write file upload double bypass

Upload upload vulnerability rename it to compete with Apache parsing vulnerability to bypass

重命名竞争
	上传名字为18.php.7Z的文件,快速重复提交该数据包,会提示文件已经被上传,但没有被重命名
		快速提交上面的数据包,可以让文件名字不被重命名上传成功
			然后利用Apache的解析漏洞,即可获得shell

(I felt the time had the same purpose at the loopholes in the competition)

Double the upload file upload vulnerability of bypassing

(Principle did not get to know too much, then ask to add up)

上传抓包
	修改第一个文件的扩展名php
		content-disposition 文件名[0]
	修改第二个文件名扩展名php
		content-disposition 文件名[2]
	拷贝第二个文件名与紧贴的一行
		黏贴到content-disposition 文件名[2]下一行
			将拷贝后的第二个文件整个替换成jpg
Published 80 original articles · won praise 8 · views 4214

Guess you like

Origin blog.csdn.net/weixin_43079958/article/details/105377210