Submit #339721: SourceCodester Vehicle Management System in PHP/MySQL V1.0 Unrestricted Uploadinfo

TitleSourceCodester Vehicle Management System in PHP/MySQL V1.0 Unrestricted Upload
DescriptionBI1IHA discovered that the file upload operation was triggered on line 25 of the 'newdriver.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE). In line 25 of the newdriver.php file, the input obtained through $-FILES is directly used to determine the storage location of the file without verification or cleaning.
Source⚠️ https://github.com/CveSecLook/cve/issues/38
User BI1IHA (UID 69245)
Submission05/20/2024 01:33 PM (10 months ago)
Moderation05/20/2024 05:40 PM (4 hours later)
StatusAccepted
VulDB Entry265289 [SourceCodester Vehicle Management System up to 1.0 HTTP POST Request /newdriver.php File unrestricted upload]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!