Submit #335838: Codezips E-commerce Site Using PHP With Source Code V1.0 Unrestricted Uploadinfo

TitleCodezips E-commerce Site Using PHP With Source Code V1.0 Unrestricted Upload
Descriptionpolaris0x1 found that the file upload operation was triggered in admin/editproduct.php, and the _FAILES variable was used to receive the payload. After receiving the attack vector from a remote attacker, it will result in unrestricted uploads, and remote attacks may lead to RCE. The input obtained from line 67 of the "/admin/editproduct.php" file is used in line 86 of the "/admin/editproduct.php" file to determine the location of the file to be written, which may allow attackers to change or damage the content of the file, or create a brand new file.
Source⚠️ https://github.com/polaris0x1/CVE/issues/2
User
 polaris0x1 (UID 67906)
Submission05/16/2024 05:17 AM (1 Year ago)
Moderation05/17/2024 08:08 AM (1 day later)
StatusAccepted
VulDB Entry264746 [Codezips E-Commerce Site 1.0 admin/editproduct.php profilepic unrestricted upload]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!