simple_php

simple_php

 

We notice taht the first condition needs us upload parameter ‘a‘ which is equal to 0 and is TRUE value.

So if the parameter ‘a‘ is 0, it represents FALSE that can not make the IF condition operation.

You know PHP is a weakly-typed language, so something like ‘0a‘ is actually equal to ‘0‘ when comparison.

And ‘0a‘ is also True value cuz it‘s not NULL string.

Therefore, we just construct the payload ‘a=0a‘ to bypass the first condition. 

Another parameter ‘b‘ demand us upload a string not only contains numeric, we still could construct that stuff payload to bypass. 

simple_php

 

simple_php

上一篇:html中表table行循环滚动例子


下一篇:548 - Tree (UVa OJ)