upload-labs靶场通关详解:第五关
一、分析源代码
$is_upload = false;
$msg = null;
if (isset($_POST['submit'])) {if (file_exists(UPLOAD_PATH)) {$deny_ext = array(".php",".php5",".php4",".php3",".php2",".html",".htm",".phtml",".pht",".pHp",".pHp5",".pHp4",".pHp3",".pHp2",".Html",".Htm",".pHtml",".jsp",".jspa",".jspx",".jsw",".jsv",".jspf",".jtml",".jSp",".jSpx",".jSpa",".jSw",".jSv",".jSpf",".jHtml",".asp",".aspx",".asa",".asax",".ascx",".ashx",".asmx",".cer",".aSp",".aSpx",".aSa",".aSax",".aScx",".aShx",".aSmx",".cEr",".sWf",".swf",".htaccess");$file_name = trim($_FILES['upload_file']['name']);$file_name = deldot($file_name);//删除文件名末尾的点$file_ext = strrchr($file_name, '.');$file_ext = strtolower($file_ext); //转换为小写$file_ext = str_ireplace('::$DATA', '', $file_ext);//去除字符串::$DATA$file_ext = trim($file_ext); //首尾去空if (!in_array($file_ext, $deny_ext)) {$temp_file = $_FILES['upload_file']['tmp_name'];$img_path = UPLOAD_PATH.'/'.$file_name;if (move_uploaded_file($temp_file, $img_path)) {$is_upload = true;} else {$msg = '上传出错!';}} else {$msg = '此文件类型不允许上传!';}} else {$msg = UPLOAD_PATH . '文件夹不存在,请手工创建!';}
}
可以看到,这一关把.htaccess文件也加入了黑名单。让我们再思考一下,既然有将jpg、png这种后缀名当成php来执行的配置文件,那么还有没有类似功能的配置文件呢?有的有的。
二、解题思路
这就是.user.ini配置文件,我们这里只需要了解两条配置命令,如下:
1.auto_prepend_file = 文件名 //包含在文件头
2.auto_append_file = 文件名 //包含在文件尾
这个配置指令的意思就是,用于指定一个文件,该文件的内容会自动附加到所有 PHP 脚本的输出头部或者末尾。
这里就要提到利用条件:
1.PHP5.3.0以上;
2.启用.user.ini配置文件;
在php.ini文件中确认以下配置
3.上传目录下有默认可执行的php文件。
在靶场的upload目录下,有一个默认的readme.php文件,
header('Content-Type:text/html; charset=utf-8'); //这句代码的作用是避免网页出现乱码显示
梳理一下思路,我们先创建一个.user.ini配置文件,写入指令auto_append_file = 666.jpg,然后上传。将一句话木马重命名为666.jpg并上传。打开上传目录下的readme.php文件,一句话木马中的代码就会被附加到其中并执行。
三、解题步骤
1.在桌面创建文件,写入指令并保存,重命名为.user.ini,然后上传。
2.将一句话木马改为666.jpg并上传。
3.打开readme.php,木马被成功执行。