Yet Another Community System (YACS) CMS 6.6.1中的多个PHP远程文件包含漏洞,远程攻击者通过以下文件的context[path_to_root]参数中的URL执行任意PHP代码:(1) articles/populate.php, (2) categories/category.php, (3) categories/populate.php, (4) comments/populate.php, (5) files/file.php, (6) sections/section.php, (7) sections/populate.php, (8) tables/populate.php, (9) users/user.php和(10) users/populate.php。late.php, (9) users/user.php, and (10) users/populate.php.
Yet Another Community System (YACS) CMS 6.6.1中的多个PHP远程文件包含漏洞,远程攻击者通过以下文件的context[path_to_root]参数中的URL执行任意PHP代码:(1) articles/populate.php, (2) categories/category.php, (3) categories/populate.php, (4) comments/populate.php, (5) files/file.php, (6) sections/section.php, (7) sections/populate.php, (8) tables/populate.php, (9) users/user.php和(10) users/populate.php。late.php, (9) users/user.php, and (10) users/populate.php.