http://www.discuz.net/

打开论坛 include 目录下的 common.inc.php
$extra = isset($extra)...">Discuz论坛爆物理路径 - exploit database | Vulners.comhttp://www.discuz.net/

打开论坛 include 目录下的 common.inc.php
$extra = isset($extra)...">http://www.discuz.net/

打开论坛 include 目录下的 common.inc.php
$extra = isset($extra)...">http://www.discuz.net/

打开论坛 include 目录下的 common.inc.php
$extra = isset($extra)...">
Lucene search

K
seebugRootSSV:1080
HistoryJan 01, 2007 - 12:00 a.m.

Discuz论坛爆物理路径

2007-01-0100:00:00
Root
www.seebug.org
25

当把变量当成数组提交时,如果不存在该数组,但存在变量,后面的preg_match()正则表达式匹配不了,

这样就出现了绝对路径的泄露

Discuz!5.2
Discuz!5.1
Discuz!4.1
Discuz!4.0
<a href target=“&quot;_blank&quot;”>http://www.discuz.net/</a><br><br>
打开论坛 include 目录下的 common.inc.php<br>

$extra = isset($extra) && preg_match<br>

改成<br>

$extra = isset($extra) && @preg_match<br>


                                                1.common.inc.php问题代码207行

.....
$navtitle&nbsp;=&nbsp;$navigation&nbsp;=&nbsp;\'\';
$extra&nbsp;=&nbsp;isset($extra)&nbsp;&&&nbsp;preg_match(\"/^[&=;a-z0-9]+$/i\",&nbsp;$extra)&nbsp;?&nbsp;$extra&nbsp;:&nbsp;\'\';
$