[原文]Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and earlier allows remote attackers to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3.
SPIP spip_rss.php type_urls Parameter Traversal Local File Inclusion
Remote / Network Access
Loss of Integrity
SPIP contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the spip_rss.php script not properly sanitizing user input supplied to the 'type_urls' variable. This may allow an attacker to include an arbitrary file from the local system that contains arbitrary commands which will be executed by the vulnerable script.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.