Blogplus 1.0版本存在多个目录遍历漏洞。远程攻击者可以借助到includes/block_center_down.php的(1)row_mysql_blocks_center_down[file]参数、到block_center_top.php的(2)row_mysql_blocks_center_top[file] includes/参数、到includes/block_left.php的(3)row_mysql_blocks_left[file]参数、到includes/block_right.php的(4)row_mysql_blocks_right[file]参数以及到(5)includes/window_down.php和 (6)includes/window_top.php的row_mysql_bloginfo[theme]参数(参数值设置为'..'),包含和运行任意的本地文件。
Blogplus 1.0版本存在多个目录遍历漏洞。远程攻击者可以借助到includes/block_center_down.php的(1)row_mysql_blocks_center_down[file]参数、到block_center_top.php的(2)row_mysql_blocks_center_top[file] includes/参数、到includes/block_left.php的(3)row_mysql_blocks_left[file]参数、到includes/block_right.php的(4)row_mysql_blocks_right[file]参数以及到(5)includes/window_down.php和 (6)includes/window_top.php的row_mysql_bloginfo[theme]参数(参数值设置为'..'),包含和运行任意的本地文件。