<?phphighlight_file(__FILE__);// FLAG in the flag.php$file = $_GET['file'];if(isset($file) && !preg_match('/base|rot/i',$file)){ @include($file);}else{ die("nope");}?>convert.iconv.*...
# [PwnThyBytes——2019]Baby_SQL
ctrl+u 最下面:
</script> <!-- /source.zip --></body></html>下载发现 /template 目录下的漏洞:
!isset($_SESSION) AND die("Direct access on this script is not allowed!");
include 'db.php';
$sql = 'SELECT...