[原文]Invision Power Board (IPB) before 2.1.6 allows remote attackers to execute arbitrary PHP script via attack vectors involving (1) the post_icon variable in classes/post/class_post.php and (2) the df value in action_public/moderate.php.
Invision Power Board moderate.php Arbitrary Code Execution
Remote / Network Access
Loss of Integrity
Invision Power Board contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not properly validate the 'df' variable in a "preg_replace()" call in the action_public/moderate.php script. This could allow a user to inject and execute arbitrary PHP code via the "e" pattern modifier, leading to a loss of integrity.
Currently, there are no known workarounds or upgrades to correct this issue. However, vendor has released a patch to address this vulnerability.