[原文]Directory traversal vulnerability in function_foot_1.inc.php for Thorsten Korner 123tkShop before 0.3.1 allows remote attackers to read arbitrary files via .. (dot dot) sequences terminated by a null character in the $designNo variable, which is part of an "include" function call.
Configure PHP such that the 'register_globals' option is set to 'off'. Allowing CGI parameters to automatically enter global variable space is a well known security risk. This option may, however, impact scripts which rely on this feature. Usage of the PHP option 'magic_quotes_gpc' may reduce the consequences of exploitation by not allowing the attacker to use the null (0x00) character to terminate include strings. The vendor has released a new version that addresses this vulnerability: Thorsten Korner 123tkShop 0.2