修正图片引用

master
高宏宇 2 months ago
parent 0d7f6f0374
commit b53132af22

@ -71,7 +71,7 @@
运行结果:
![image-20251021092027968](/media/danny/Data/CUIT/代码审计/第五章/img/image-20251021092027968.png)
![image-20251021092027968](img/image-20251021092027968.png)
### 1.1.3. 远程文件包含RFI
@ -118,7 +118,7 @@ http://localhost/2020CodeAudit/C5/include/remoteinclude.php?url=php://input
F12打开Edge的调试模式。
![image-20251021101739615](/media/danny/Data/CUIT/代码审计/第五章/img/image-20251021101739615.png)
![image-20251021101739615](img/image-20251021101739615.png)
1. 选择请求类型 POST
2. 输入URLhttp://localhost/2020CodeAudit/C5/include/remoteinclude.php?url=php://input

@ -381,7 +381,7 @@ insert into tables(1,2) values('xx',0x3c7363726970743e616c6572742831293c2f736369
insert into userinfo(username,PASSWORD, email) values('xx',0x3c7363726970743e616c6572742831293c2f73636970743e,'a');
```
![image-20251023142651626](/media/danny/Data/CUIT/代码审计/第六章/img/image-20251023142651626.png)
![image-20251023142651626](img/image-20251023142651626.png)
双等于和三等于
@ -459,7 +459,7 @@ if(file_exists('install.lock'){
还有一种是以重复发包来利用时间差,以少量的钱多次购买。
![image-20251023144200551](/media/danny/Data/CUIT/代码审计/第六章/img/image-20251023144200551.png)
![image-20251023144200551](img/image-20251023144200551.png)
## 2.2. Ecshop逻辑错误注入
@ -559,7 +559,7 @@ http://localhost/ECshop/respond.php?code=alipay&subject=0&out_trade_no=%00' and
另外,浮现该漏洞需要打开后台的支付宝功能。
![image-20251023165548260](/media/danny/Data/CUIT/代码审计/第六章/img/image-20251023165548260.png)
![image-20251023165548260](img/image-20251023165548260.png)
# 3. 会话认证漏洞

Loading…
Cancel
Save