当前位置:网站首页>[Vulnerability reproduction] CVE-2018-7490 (path traversal)
[Vulnerability reproduction] CVE-2018-7490 (path traversal)
2022-08-09 08:40:00 【z.volcano】
Affected Versions
Previous to uWSGI 2.0.17
Environment
https://github.com/vulhub/vulhub/blob/master/uwsgi/CVE-2018-7490
Or directly use the environment in BUUOJ
Vulnerability Analysis
uWSGI PHP Plugin < 2.0.17 does not properly handle the --php-docroot option detected by DOCUMENT_ROOT, allowing attackers to passA specially crafted URL request with a '...' sequence to maliciously view arbitrary files on the system.
Get started
Open buuoj's drone and see
Don't use the payload in the exp first, try to see if ../../../ can perform directory traversal, you can find that the page and url have not changed, indicating that it is filtered
So urlencode ../ once,Get the ..%2f in the payload and upload the payload directly
Successfully read /etc/passwd file
边栏推荐
- [MySQL]mysql: Solve the problem of [Err] 1093 - You can't specify target table 'table name' for update in FROM clause
- leetcode 32. 最长有效括号 (困难)
- Regular Expressions for Shell Programming
- jdbctemplate连接sql server,代码中查出来的数据跟数据库中不一致,如何解决?
- 不同风格的Flask-restful
- 【GNN】2022 G-Mixup: Graph Data Augmentation for Graph Classification
- The Servlet,
- nyoj306 走迷宫(搜索+二分)
- 监视文本框的输入
- prepareStatement的使用
猜你喜欢
随机推荐
The Martian - Simple Math Problems
深度学习时代的视频理解综述
897. Increasing Order Search Tree
Programming a washing machine: garbled characters after string output
【redis】使用redis实现简单的分布式锁,秒杀并发场景可用
Xpath之爬取全国城市名称学习
OpenHarmony轻智能产品开发直播笔记
eTS UI开发学习
monitor textbox input
Go语言技巧之正确高效使用slice(听课笔记总结--简单易懂)
Three handshakes, four waves
leetcode 34. 在排序数组中查找元素的第一个和最后一个位置(二分经典题)
P1064 金明的预算方案
Processes and Scheduled Tasks
【redis】redis之过期监听
EMQ X 消息服务器学习记录——为后面的毕设做准备
The story of the disappearing WLAN of Windows 10 computers
Introduction to the Endpoint
浅谈Endpoint
黑马2022最新redis课程笔记知识点(面试用)





![[MySQL]mysql: Solve the problem of [Err] 1093 - You can't specify target table 'table name' for update in FROM clause](/img/76/8e6a3a1c5fdc9bffc0c7c9187a027c.png)



