The upload is only for js verification. It seems that I have only uploaded the file under the topic. It seems that this problem also exists in the upload of the Avatar (not tested). Click the topic image to edit and upload the image. Use the Firefox tamper data plug-in and start interception. Select a 2bb.jpg file (meaning a normal picture of a php sentence) and a 2bb file in the directory. php (reserved for backup) modifies the data in the tamaper data, and changes 2bb. change JPG to 2bb. php can see the uploaded php image pony, but this is after processing, as long as the 100X100 parameter or 50x50 parameter after the url is removed, you can get a PHP pony that has not been processed. Proof of vulnerability: the official has got shell Maer address http://wenda.anwsion.com/topic/%E7%BC%96%E8%BE%91%E5%99%A8 http://wenda.anwsion.com/uploads/topic/20120911/134730998609.phppassword ghost. The original intention of this source code is very simple. You need to use it .....
Solution: do not understand