|
在wooyun看到51CTO漏洞由此联想到可批量getshell。
Code:
[mw_shl_code=php,true] switch ($_GET['w']){
case "sheng":
@eval("\$found = eregi(\"$keyword[$ai]\",\"$detail[0]\");");break;
case "diqu":
@eval("\$found = eregi(\"$keyword[$ai]\",\"$detail[1]\");");break;
case "shi":
@eval("\$found = eregi(\"$keyword[$ai]\",\"$detail[2]\");");break;
case "cun":
@eval("\$found = eregi(\"$keyword[$ai]\",\"$detail[3]\");");break;
case "youbian":
@eval("\$found = eregi(\"$keyword[$ai]\",\"$detail[4]\");");break;
case "quhao":
@eval("\$found = eregi(\"$keyword[$ai]\",\"$detail[5]\");");break;
default:
@eval("\$found = eregi(\"$keyword[$ai]\",\"$dreamdb[$i]\");");break;
}[/mw_shl_code]
看看上面代码大家发现了什么?
|
|