Let me preface this by saying I'm not a security expert, however considering that the above line is immediately preceeded by:
if (!isset($_REQUEST['action']) || !isset($actionArray[$_REQUEST['action']]))
....with a default action defined by either the theme or the the SMF software itself (causing the LFI statement to never be reached), and that $actionArray is statically defined beforehand; is this really an LFI vulnerability, or just something that looks like the LFI pattern on the surface?
討論串 (同標題文章)