野草weedcmsV5.2.1 任意删除文件漏洞
摘要:member.phpif($action=='edit_member_ok'){//member.php?action=edit_membe...
member.php
if($action=='edit_member_ok'){ //member.php?action=edit_member_ok
check_request(); //检查来路
if(!check_login()){ //检测是否登录会员
message(array('text'=>$language['please_login'],'link'=>'member.php'));
}
...省略一堆无关东西
$member_photo_delete=empty($_POST['member_photo_delete'])?'':trim($_POST['member_photo_delete']);
..继续省略一堆无关东西
if(!empty($member_photo_delete)){
@unlink(ROOT_PATH."/uploads/".$member_photo_delete);
//直接删除了
【野草weedcmsV5.2.1 任意删除文件漏洞】相关文章:
★ Microsoft Visual Interdev 文件缓冲区溢出漏洞
★ Linux Kernel vmsplice_to_pipe本地权限提升漏洞
★ 雅虎通 ActiveX控件GetFile方式任意文件上传漏洞
★ Adobe Flash Player SWF 文件中的标签堆溢出漏洞
上一篇:
关于bo-blog的安全隐患