[原文]Directory traversal vulnerability in index.php in phpSysInfo 2.5.1 allows remote attackers to determine the existence of arbitrary files via a .. (dot dot) sequence and a trailing null (%00) byte in the lng parameter, which will display a different error message if the file exists.
phpSysInfo index.php lng Variable Traversal File Existence Enumeration
Remote / Network Access
Loss of Confidentiality
phpSysInfo contains a flaw that allows a remote attacker to access arbitrary files outside of the web path. The issue is due to the index.php script not properly sanitizing user input, specifically directory traversal style attacks (../../) supplied via the 'lng' variable and null terminated.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.