首页 > Web开发 > 详细

simple_php

时间:2021-08-09 23:32:22      阅读:55      评论:0      收藏:0      [点我收藏+]

技术分享图片

 

We notice taht the first condition needs us upload parameter ‘a‘ which is equal to 0 and is TRUE value.

So if the parameter ‘a‘ is 0, it represents FALSE that can not make the IF condition operation.

You know PHP is a weakly-typed language, so something like ‘0a‘ is actually equal to ‘0‘ when comparison.

And ‘0a‘ is also True value cuz it‘s not NULL string.

Therefore, we just construct the payload ‘a=0a‘ to bypass the first condition. 

Another parameter ‘b‘ demand us upload a string not only contains numeric, we still could construct that stuff payload to bypass. 

技术分享图片

 

simple_php

原文:https://www.cnblogs.com/4fun/p/15120967.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!