Home >Operation and Maintenance >Safety >How to parse Apache vulnerability recurrence

How to parse Apache vulnerability recurrence

WBOY
WBOYforward
2023-05-22 12:10:131153browse

apacheParsing vulnerability

Vulnerability principle

Parse the file suffix name from right to left. If If you find an unrecognized file suffix, continue to the left. For example, test.php.owf.rar ".owf" and ".rar" are two suffixes that apache cannot recognize and parse, and apache will parse wooyun.php.owf.rar into php.

Vulnerability form

www.xxxx.xxx.com/test.php.xxx

Other configuration issues lead to the vulnerability

(1) If there is such a line in Apache's conf to configure AddHandler php5-script .php, then as long as the file name contains .php, even if the file name is test2.php.jpg, it will be executed as php.
(2) If there is such a line configuration in Apache's conf AddType application/x-httpd-php .jpg, even if the extension is jpg, it can still be executed in php mode.

Experimental environment: Windows Server 2008 R2

Phpstudy2018

How to parse Apache vulnerability recurrence

Add AddHandler php5-script .php in httpd.conf and restart after adding

How to parse Apache vulnerability recurrence

Create a php sentence in the root directory with the suffix .php.xxx

How to parse Apache vulnerability recurrence

Access and see if it can be parsed

How to parse Apache vulnerability recurrence

Parse successfully, Ant Sword connection

How to parse Apache vulnerability recurrence

The above is the detailed content of How to parse Apache vulnerability recurrence. For more information, please follow other related articles on the PHP Chinese website!

Statement:
This article is reproduced at:yisu.com. If there is any infringement, please contact admin@php.cn delete