[原文]Directory traversal vulnerability in source.php in Quick & Dirty PHPSource Printer 1.1 and earlier allows remote attackers to read arbitrary files via ".../...//" sequences in the file parameter, which are reduced to "../" when PHPSource Printer uses a regular expression to remove "../" sequences.
Quick & Dirty PHP Source Printer contains a flaw that allows a remote attacker to access arbitrary files outside of the web path. The issue is due to the source.php script not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the 'file' variable.
Upgrade to version 1.1.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.