亚洲精品久久久久久久久久吃药,欧美日韩高清在线一区,国产福利在线,欧美亚洲影院,影音先锋国产资源,国产精品一区二区62,久久久www免费人成黑人精品

技術(shù)文章
阿里云提示Discuz memcache+ssrf GETSHELL漏洞如何解決
發(fā)布日期:2019-08-15 閱讀次數(shù):2633 字體大?。?a href="javascript:;" onclick="ChangeFontSize('content',16)">大

一般這個漏洞都是下面文件,source/function/function_core.php

搜索下面代碼:

$content = preg_replace($_G['setting']['output']['preg']['search'], $_G['setting']['output']['preg']['replace'], $content);

在此行代碼前增加下面代碼:

if (preg_match("(/|#|\+|%).*(/|#|\+|%)e", $_G['setting']['output']['preg']['search']) !== FALSE) { die("request error"); }

加完代碼以后效果:

if (preg_match("(/|#|\+|%).*(/|#|\+|%)e", $_G['setting']['output']['preg']['search']) !== FALSE) { die("request error"); }
$content = preg_replace($_G['setting']['output']['preg']['search'], $_G['setting']['output']['preg']['replace'], $content);

上傳文件,重新進(jìn)行驗證就可以解決。