Invision Power Board (IPB) 2.1.4及之前版本可使远程攻击者借助对多个目录(包括(1) sources/loginauth/convert/、(2) sources/portal_plugins/、(3) cache/skin_cache/cacheid_2/、(4) ips_kernel/PEAR/、(5) ips_kernel/PEAR/Text/、(6) ips_kernel/PEAR/Text/Diff/、(7) ips_kernel/PEAR/Text/Diff/Renderer/、(8) style_images/1/folder_rte_files/、(9) style_images/1/folder_js_skin/、(10) style_images/1/folder_rte_images/和(11) upgrade/及其子目录)的直接请求列出目录内容。
Invision Power Board (IPB) 2.1.4及之前版本可使远程攻击者借助对多个目录(包括(1) sources/loginauth/convert/、(2) sources/portal_plugins/、(3) cache/skin_cache/cacheid_2/、(4) ips_kernel/PEAR/、(5) ips_kernel/PEAR/Text/、(6) ips_kernel/PEAR/Text/Diff/、(7) ips_kernel/PEAR/Text/Diff/Renderer/、(8) style_images/1/folder_rte_files/、(9) style_images/1/folder_js_skin/、(10) style_images/1/folder_rte_images/和(11) upgrade/及其子目录)的直接请求列出目录内容。