Upload Attack Analysis - PHP 上传攻击分析

//Low: <?php if (isset($_POST['Upload'])) { $target_path = DVWA_WEB_PAGE_TO_ROOT."hackable/uploads/"; $target_path = $target_path . basename( $_FILES['uploaded']['name']); if(!move_uploaded_file($_FILES['uploaded']['tmp_name'], $target_path)) { $html .= ' '; $html .= 'Your image was not uploaded.'; $html .= ' '; } else { $html .= ' '; $html .= $target_path . ' succesfully uploaded!'; $html .= ' '; } } ?> //突破方式:无任何过滤 直接上传p