Title | itsourcecode Tailoring Management System Project In PHP 1.0 Unrestricted Upload |
---|
Description | The file upload operation was triggered on line 51 of the "setlogo.php" file, and the uploaded file was received using the "$_FILES" variable. Due to the lack of appropriate input validation and cleaning, remote attackers only need to use regular user login to pass malicious payloads through this file upload function, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).
In line 51 of the setlogo.php file,The input obtained through $_FILES is directly used to determine the storage location of the file, without conducting a complete security check. The specific code snippet is as follows: |
---|
Source | ⚠️ https://github.com/CveSecLook/cve/issues/57 |
---|
User | wangjiakang (UID 72714) |
---|
Submission | 08/05/2024 05:37 PM (4 months ago) |
---|
Moderation | 08/05/2024 09:52 PM (4 hours later) |
---|
Status | Accepted |
---|
VulDB Entry | 273649 [itsourcecode Tailoring Management System 1.0 /setlogo.php bgimg unrestricted upload] |
---|
Points | 20 |
---|