up.time 7.5.0 Arbitrary File...

- AV AC AU C I A
发布: 2015-08-22
修订: 2025-04-13

Input passed to the 'file_name' parameter in 'get2post.php' script is not properly sanitised before being used to get the contents of a resource and delete files. This can be exploited to read and delete arbitrary data from local resources with the permissions of the web server using a proxy tool.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息