AJ-Fork 167版本存在漏洞。远程攻击者借助(1)auto-acronyms.php,(2)auto-archive.php,(3)ount-article-views.php,(4)kses.php,(5)custom-quick-tags.php,(6)disable-all-comments.php,(7)easy-date-format.php,(8)enable-disable-comments.php,(9)filter-by-author.php,(10)format-switcher.php,(11)long-to-short.php,(12)prospective-posting.php,或(13)sort-by-xfield.php的直接请求获取敏感信息,该漏洞在出错信息中显示完整路径。
AJ-Fork 167版本存在漏洞。远程攻击者借助(1)auto-acronyms.php,(2)auto-archive.php,(3)ount-article-views.php,(4)kses.php,(5)custom-quick-tags.php,(6)disable-all-comments.php,(7)easy-date-format.php,(8)enable-disable-comments.php,(9)filter-by-author.php,(10)format-switcher.php,(11)long-to-short.php,(12)prospective-posting.php,或(13)sort-by-xfield.php的直接请求获取敏感信息,该漏洞在出错信息中显示完整路径。