PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

which includes a file specified by request): <code> <?

Consider the PHP program (which includes a file specified by request):
<code>
<?php
$color = ‘blue’;
if (isset( $_GET[‘COLOR’] ) )
$color = $_GET[‘COLOR’];
require( $color . ‘.php’ );
?>
<form method=”get”>
<select name=”COLOR”>
<option value=”red”>red</option>
<option value=”blue”>blue</option>
</select>
<input type=”submit”>
</form>
</code>
A malicious user injects the following command:
<code>
/vulnerable.php?COLOR=C:\\notes.txt%00
</code>
Where vulnerable.php is a remotely hosted file containing an exploit. What does the malicious
user want to do?


Page 81 of 101« First...102030...7980818283...90100...Last »