漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Directory traversal vulnerability in classes/index.php in Lithium CMS 4.04c and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the siteconf[curl] parameter, as demonstrated by a POST to news/comment.php containing PHP code, which is stored under db/comments/news/ and included by classes/index.php.
漏洞信息
N/A
漏洞
N/A
漏洞
Lithium CMS classes/index.php 目录遍历漏洞
漏洞信息
Lithium CMS中的classes/index.php存在目录遍历漏洞,远程攻击者可以通过在一个siteconf[curl]参数(该参数中包含..)来执行任意本地代码,如对带有PHP代码的news/comment.php的POST操作,此文件是保存在db/comments/news/ 下面并由classes/index.php包含。
漏洞信息
N/A
漏洞
N/A