<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Translations%3ACVE-2021-32924_IPS_Community_Suite_4.5.4.2_PHP%E4%BB%A3%E7%A2%BC%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%2F2%2FChinese</id>
	<title>Translations:CVE-2021-32924 IPS Community Suite 4.5.4.2 PHP代碼注入漏洞/2/Chinese - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Translations%3ACVE-2021-32924_IPS_Community_Suite_4.5.4.2_PHP%E4%BB%A3%E7%A2%BC%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%2F2%2FChinese"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:CVE-2021-32924_IPS_Community_Suite_4.5.4.2_PHP%E4%BB%A3%E7%A2%BC%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E/2/Chinese&amp;action=history"/>
	<updated>2026-04-11T21:24:09Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:CVE-2021-32924_IPS_Community_Suite_4.5.4.2_PHP%E4%BB%A3%E7%A2%BC%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E/2/Chinese&amp;diff=3814&amp;oldid=prev</id>
		<title>FuzzyBot: Importing a new version from external source</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:CVE-2021-32924_IPS_Community_Suite_4.5.4.2_PHP%E4%BB%A3%E7%A2%BC%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E/2/Chinese&amp;diff=3814&amp;oldid=prev"/>
		<updated>2021-06-01T02:44:25Z</updated>

		<summary type="html">&lt;p&gt;Importing a new version from external source&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;IPS Community Suite versions 4.5.4.2及以下版本存在 PHP 代碼注入漏洞。 該漏洞的存在是因為&amp;lt;code&amp;gt;IPS\cms\modules\front\pages\_builder::previewBlock()&amp;lt;/code&amp;gt;方法允許將任意內容傳遞給&amp;lt;code&amp;gt;IPS\_Theme::runProcessFunction()&amp;lt;/code&amp;gt;方法，該方法將用於調用&amp;lt;code&amp;gt;eval()&amp;lt;/code&amp;gt;PHP函數。 這可以被利用來注入和執行任意 PHP 代碼。 成功利用此漏洞需要具有管理側邊欄權限的帳戶（例如版主或管理員）並啟用“cms”應用程序。&lt;/div&gt;</summary>
		<author><name>FuzzyBot</name></author>
	</entry>
</feed>