当前位置:网站首页>Vulnerability recurrence ----- 35. Uwsgi PHP directory traversal vulnerability (cve-2018-7490)
Vulnerability recurrence ----- 35. Uwsgi PHP directory traversal vulnerability (cve-2018-7490)
2022-06-30 18:23:00 【Seven days】
List of articles
One 、uWSGI brief introduction
uWSGI
: It's a Web The server , It has achieved WSGI agreement 、uwsgi、http Such agreement .Nginx in HttpUwsgiModule Its function is to communicate with uWSGI The server exchanges .WSGI It's a kind of Web Server gateway interface . It's a Web The server ( Such as nginx,uWSGI Wait for the server ) And web application ( If used Flask The program written by the framework ) A specification of communication .
uwsgi The agreement is a uWSGI The server has its own protocol , It is used to define the type of information transmitted (type of information), every last uwsgi packet front 4byte Description of the type of information transmitted , It is associated with WSGI There are two things in comparison .
WSGI / uwsgi / uWSGI The difference between the three concepts :
1、WSGI Is a communication protocol .
2、uwsgi It's a line protocol, not a communication protocol , This is often used in uWSGI Data communication between server and other network servers .
3、 and uWSGI Is to implement the uwsgi and WSGI Two kinds of agreement Web The server .
Two 、 Causes of loopholes 、 Reappear
uWSGI<2.0.17
At the time of the PHP plug-in unitDOCUMENT_ROOT
Detection not handled correctly , Lead to DOCUMENT_ROOT By using..%2f Instead of ../
Bypassable defense strategy .
边栏推荐
- 每日面试1题-如何防止CDN防护被绕过
- TCP session hijacking based on hunt1.5
- 抖音最新Xbogus,signature生成js逆向分析
- LeetCode之合并二叉树
- [PROJECT] Xiaomao school (IX)
- Openlayers roller shutter map
- Small tools (3) integration knife4j3.0.3 interface document
- Partition marble (multiple knapsack + binary optimization)
- Flink series: checkpoint tuning
- The secondary menu of the magic article system v5.4.0 supports the optimization of form display
猜你喜欢
Optimize with netcorebeauty Net core independent deployment directory structure
News management system based on SSM
Research on the principle of Tencent persistence framework mmkv
Deep understanding of JVM (V) - garbage collection (II)
Vulnerability recurrence ----- 38. Thinkphp5 5.0.23 Remote Code Execution Vulnerability
同济、阿里的CVPR 2022最佳学生论文奖研究了什么?这是一作的解读
LRN local response normalization
Another CVPR 2022 paper was accused of plagiarism, and Ping An insurance researchers sued IBM Zurich team
Small tools (3) integration knife4j3.0.3 interface document
Alexnet of CNN classic network (Theory)
随机推荐
Deep understanding of JVM (I) - memory structure (I)
Redis (V) - advanced data types
Vue3 reactive database
How to solve the lock-in read-only alarm of AutoCAD Chinese language?
Design of online shopping mall based on SSH
基于SSH的网上商城设计
Redis (I) - data type
Add code block in word (Reprint)
Redis (III) - transaction
uni-app进阶之内嵌应用【day14】
Redis (II) -- persistence
ASP. Net password encryption and password login
基於SSH的網上商城設計
报名“互联网+”大赛华为云命题,诸多礼品任你拿!
The new Post-00 Software Test Engineer in 2022 is a champion
Flink series: checkpoint tuning
Volcano engine was selected into the first "panorama of edge computing industry" in China
Post MSF infiltration summary
基于eNSP的校园网设计的仿真模拟
Nft: unlimited possibilities to open the era of encryption Art