### 简要描述:
第5弹
### 详细说明:
这回是post的命令执行而且需要注释掉后面的参数。
```
if ( $_POST['act'] == "auth" )
{
$command = "/srun3/radius/bin/radtest ".trim( $_POST['uname'] )." ".trim( $_POST['pass'] )." ".$array['server_ip']." 10 ".$array['secret']; //后面注释掉就好
if ( $fp = popen( $command, "r" ) ) //这里
{
$con = fread( $fp, 10240 );
pclose( $fp );
}
```
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201405/27110637b04b8377bf6b912f49db4c7b78b6f574.png" alt="radtest.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/27110637b04b8377bf6b912f49db4c7b78b6f574.png)
[<img src="https://images.seebug.org/upload/201405/27110651247ccd72d8f9f6327a3c681e1cf46ece.png" alt="radtest1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/27110651247ccd72d8f9f6327a3c681e1cf46ece.png)
暂无评论