read8 3.5 getshell

./js.php $arguments = $hash = ''; isset($_GET['argument']) && $argument = $_GET['argument']; isset($_GET['hash']) && $hash = $_GET['hash']; $arguments = unserialize(base64_decode($argument)); //$arguments参数来自get (serialize一下在base64_encode一下。。) print_r($arguments);

易想团购 注入漏洞

闲的蛋疼 看会代码 这个漏洞有点意思 ./vote.php if($_REQUEST['act']=='dovote') { $ok = false; foreach($_REQUEST['name'] as $vote_ask_id=>$names) //便利name { //echo $vote_ask_id."||".$names; foreach($names as $kk=>$name) // 再次便利 所以$_REQUEST['name']要是一个二维数

maccms 鸡肋上传漏洞

一小程序,无意间看到的顺便就看了下 ./admin/editor/upload.php require_once ("../admin_conn.php"); $action=be("get","action"); $ftypes=array('jpg','gif','bmp','png',".jpeg"); $upfileDir= "../". $_SESSION["upfolder"] . "/" . getSavePicPath() . "/"; $maxSize=1000; if(!file_exists($upfileDir)){ mkdir($upfileDir); } foreach($_FILES as $FILEa){ if(!in_array(substr($FILEa['name'],-3,3),$ftypes)) $errm = "文件格式不正确1 [ <a href=# onclick=history.g